Keenan  

@Keenan7310

CTF player @ excusemewtf / Pwn / learning v8🤔 /

Vrijeme pridruživanja: kolovoz 2019.

Tweetovi

Blokirali ste korisnika/cu @Keenan7310

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Keenan7310

  1. proslijedio/la je Tweet
    2. velj

    Pointer Compression in V8 and what it means for browser exploitation by

    Poništi
  2. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  3. proslijedio/la je Tweet
    16. sij

    一直以来不理解的一个 O(1) 的大整数乘法黑科技 In the expression ((long double)a / p * b + 0.5), what's the use of 0.5? If this number is removed, the result of Miller-Rabin primality test will not be accurate.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    13. sij
    Poništi
  5. proslijedio/la je Tweet
    Poništi
  6. proslijedio/la je Tweet
    3. sij
    Poništi
  7. proslijedio/la je Tweet
    2. sij

    So, it's been a while since I posted on my blog, but I had some spare time over the holidays to do a write up on reversing 's VM1 challenge and writing a custom VM interpreter for it, as well as incorporating YARA into it! Check it out!

    Poništi
  8. proslijedio/la je Tweet
    2. sij

    Public the exploit code for cve-2019-8038 and cve-2019-8039. Two UAF bug in Adobe reader DC. It could pop a calc after disable ASLR. More details will be described after my final exam....

    Poništi
  9. proslijedio/la je Tweet
    30. pro 2019.

    - Deep dive into a bug in the SSE version of libc's strncpy. Awesome challenge by at !

    Poništi
  10. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  11. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  12. proslijedio/la je Tweet

    Solid secure boot bypass write-up. Particularly keen on the honesty around strings + OS making reverse engineering far quicker.

    Poništi
  13. 22. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    21. pro 2019.

    Reverse Engineering a real world 249 bytes backdoor!

    Poništi
  15. proslijedio/la je Tweet
    21. pro 2019.

    Pwning VMWare, Part 1: RWCTF 2018 Station-Escape

    Poništi
  16. proslijedio/la je Tweet
    21. pro 2019.

    We just placed 2nd @ wtftime! Thanks for playing along :) Gonna enjoy the free club mate at 36c3 ;)

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet

    List 💰💰 Follow this Page for Free Bug Bounty Tricks and Tutorials 💰

    Poništi
  18. 18. pro 2019.

    I finally realized how these gadgets came from😅

    Prikaži ovu nit
    Poništi
  19. 18. pro 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·