Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @HeapSmasher
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HeapSmasher
-
HeapSmasher proslijedio/la je Tweet
No source, no problem! High speed binary fuzzing by Nspace and gannimo at 36C3 https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10880.html …https://www.youtube.com/watch?v=ysZ9w3PcYVU …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
Is there an easy way/tool that i am not aware of that will print all structure elements of a C struct incl. position, size and type to stdout in a human (and potentially machine) readable format?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
ロシア軍事ハッカーがオランダで捕まった時のプレゼン資料。本名、パスポート番号、使ったツール等々全部暴露!w APTもWifi Pineappleを使うのね。皆さんWifiハッキング対策をしてくださいね。https://english.defensie.nl/topics/cyber-security/documents/publications/2018/10/04/gru-close-access-cyber-operation-against-opcw …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
Want to capture network traffic from the new Microsoft Edge (or Google Chrome)? I've published a short video to show how easy it is to capture traffic using the built-in Net Export feature, and how to analyze it using free tools.https://www.youtube.com/watch?v=2RGdZbGgskk …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
Assert yourself on the browser playground with
@mmolgtm ’s guide to hunting Chrome IPC sandbox escapes:https://securitylab.github.com/research/chromium-ipc-vulnerabilities …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
HeapSmasher proslijedio/la je Tweet
Browser jit exploitation quick start:
@5aelo Phrack paper is the base: http://phrack.org/papers/attacking_javascript_engines.html …@LiveOverflow well-described video series: https://liveoverflow.com/tag/browser-exploitation/ …@bkth_ presentation in SSTIC 2019: https://www.sstic.org/media/SSTIC2019/SSTIC-actes/Pwning_Browsers/SSTIC2019-Slides-Pwning_Browsers-keith.pdf … Also: https://doar-e.github.io/ https://phoenhex.re/ https://twitter.com/Sivenruot/status/1216293644757372928 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.https://github.com/0xZ0F/Z0FCourse_ReverseEngineering …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64. https://github.com/0xb0bb/pwndra pic.twitter.com/o1JPjyjgga
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
Checked news on modern hypervisor research publications/vuls/exploits from the past few months that I missed on other projects. Nothing new, as usual... Few bugs in Hyper-V w/o details, few TianfuCups w/o details, VMWare and VirtualBox keep sweeping security bugs under the carpet
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
Reverse Engineering Resource Collection. 3000+ open source tools, ~600 blog posts.https://github.com/alphaSeclab/awesome-reverse-engineering/blob/master/Readme_en.md …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
Awesome collaboration between
@tiraniddo &@_strohu on hunting for a class of Windows kernel driver vulns. This is what happens when you combine a logic-flaw-finding expert, an MSRC security engineer, and a powerful static analysis tool like Semmle :)https://blogs.technet.microsoft.com/srd/2019/03/14/local-privilege-escalation-via-the-windows-i-o-manager-a-variant-finding-collaboration/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
Part 2 of Windows Kernel Exploitation: Exploitation of Type Confusion vulnerabilities in Windows Kernel.https://pwnrip.com/windows-kernel-exploitation-part-2-type-confusion/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
New blog: Finding new windows kernel vulnerability by understanding the old bughttps://blog.fortinet.com/2016/08/17/root-cause-analysis-of-windows-kernel-uaf-vulnerability-lead-to-cve-2016-3310 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
A lot of mud slinging on InfoSec twitter lately; I wanted to flip the script a bit and highlight the blogs, tools, talks etc that I keep coming back to on a regular basis, both as a defender and general InfoSec professional. Thread..
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
Does anyone have a good quickstart guide for pentesting IOT devices? I know it's a huge range, but I'm at the "where do I start" point of things.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
HeapSmasher proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
HeapSmasher proslijedio/la je Tweet
Now that Ms RDP aka Terminal Services is finally getting hot as an offensive research target (it’s scheduled for pwn2own for the 1st time, + recently published paper on client-side bugs), here is a little research on TS reversing that I presented in 2011:https://www.slideshare.net/mobile/alisaesage/hacking-microsoft-remote-desktop-services-for-fun-and-profit …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HeapSmasher proslijedio/la je Tweet
Intro to Windows Kernel Driver Exploitation : https://glennmcgui.re/introduction-to-windows-kernel-exploitation-pt-1/ … , HackSys Extreme Vulnerable Windows Driver :https://github.com/hacksysteam/HackSysExtremeVulnerableDriver …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.