HeapSmasher

@HeapSmasher

MIT of the North | RT ≠ endorsement | Opinions are of my own

Vrijeme pridruživanja: travanj 2018.

Tweetovi

Blokirali ste korisnika/cu @HeapSmasher

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HeapSmasher

  1. proslijedio/la je Tweet
    6. sij
    Poništi
  2. proslijedio/la je Tweet
    25. sij

    Is there an easy way/tool that i am not aware of that will print all structure elements of a C struct incl. position, size and type to stdout in a human (and potentially machine) readable format?

    Poništi
  3. proslijedio/la je Tweet

    ロシア軍事ハッカーがオランダで捕まった時のプレゼン資料。本名、パスポート番号、使ったツール等々全部暴露!w  APTもWifi Pineappleを使うのね。皆さんWifiハッキング対策をしてくださいね。

    Poništi
  4. proslijedio/la je Tweet
    17. sij

    Want to capture network traffic from the new Microsoft Edge (or Google Chrome)? I've published a short video to show how easy it is to capture traffic using the built-in Net Export feature, and how to analyze it using free tools.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    15. sij

    Assert yourself on the browser playground with ’s guide to hunting Chrome IPC sandbox escapes:

    Poništi
  6. proslijedio/la je Tweet
    14. sij

    リバースエンジニアリングのトレーニング教材。

    Poništi
  7. proslijedio/la je Tweet
    13. sij
    Poništi
  8. proslijedio/la je Tweet
    11. sij

    My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  10. proslijedio/la je Tweet

    Checked news on modern hypervisor research publications/vuls/exploits from the past few months that I missed on other projects. Nothing new, as usual... Few bugs in Hyper-V w/o details, few TianfuCups w/o details, VMWare and VirtualBox keep sweeping security bugs under the carpet

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    20. pro 2019.

    Reverse Engineering Resource Collection. 3000+ open source tools, ~600 blog posts.

    Poništi
  12. proslijedio/la je Tweet
    14. ožu 2019.

    Awesome collaboration between & on hunting for a class of Windows kernel driver vulns. This is what happens when you combine a logic-flaw-finding expert, an MSRC security engineer, and a powerful static analysis tool like Semmle :)

    Poništi
  13. proslijedio/la je Tweet
    3. tra 2019.

    Part 2 of Windows Kernel Exploitation: Exploitation of Type Confusion vulnerabilities in Windows Kernel.

    Poništi
  14. proslijedio/la je Tweet
    18. kol 2016.

    New blog: Finding new windows kernel vulnerability by understanding the old bug

    Poništi
  15. proslijedio/la je Tweet
    24. pro 2019.

    A lot of mud slinging on InfoSec twitter lately; I wanted to flip the script a bit and highlight the blogs, tools, talks etc that I keep coming back to on a regular basis, both as a defender and general InfoSec professional. Thread..

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet

    Does anyone have a good quickstart guide for pentesting IOT devices? I know it's a huge range, but I'm at the "where do I start" point of things.

    Poništi
  17. proslijedio/la je Tweet
    15. ruj 2019.

    cursed regex (1,253,604 chars long)

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    A little surprised with the absense of fancy discussion about the emerging state of the art methods and tech for building inherently secure systems, such as formally verified microkernels (eg. ) and compiler-enforced memory safety () in the security community

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet

    Now that Ms RDP aka Terminal Services is finally getting hot as an offensive research target (it’s scheduled for pwn2own for the 1st time, + recently published paper on client-side bugs), here is a little research on TS reversing that I presented in 2011:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    7. ruj 2017.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·