Youssef

@M1cR0xf7

Hacker • x86/Arm Exploit Dev • Red team • Machine Learning

%EAX
Vrijeme pridruživanja: kolovoz 2018.

Tweetovi

Blokirali ste korisnika/cu @M1cR0xf7

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @M1cR0xf7

  1. proslijedio/la je Tweet
    30. sij
    Poništi
  2. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  3. Poništi
  4. proslijedio/la je Tweet
    29. sij

    I made a goose that destroys your computer Download it free here:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    25. sij
    Poništi
  7. proslijedio/la je Tweet
    20. sij
    Poništi
  8. proslijedio/la je Tweet

    500k passwords published from telnet scans and brute forcing. Telnet... 🤷‍♂️

    Poništi
  9. proslijedio/la je Tweet
    17. sij

    Vulnerability severity levels

    Poništi
  10. proslijedio/la je Tweet
    13. sij

    And here's the payload to drop, before running a mouse jiggler (to prevent the real LockScreen)

    Poništi
  11. proslijedio/la je Tweet
    12. sij

    Switzerland 🇨🇭 via: sennarelax

    Poništi
  12. proslijedio/la je Tweet
    13. sij

    Just published a new video: Backdooring an IoT camera by creating a malicious firmware upgrade!

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    13. sij
    Poništi
  14. proslijedio/la je Tweet
    12. sij

    I just found out someone assigned a CVE to . This is my first CVE ever! 🔥 CVE-2019-8900 Apple devices vulnerable to arbitrary code execution in SecureROM

    Poništi
  15. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  16. proslijedio/la je Tweet
    9. sij

    It’s never to late to do ANYTHING! Nothing is impossible, nothing is un hackable. It’s just a matter of resources and time invested. We actually did put 14+ things/devices/rovers on mars! That’s insane! And so cool! And made possible by teamwork, not a one man show!

    Poništi
  17. proslijedio/la je Tweet
    8. sij
    http://www.flickr.com/photos/typojo/4209609668/
    Poništi
  18. proslijedio/la je Tweet
    9. sij

    Have reproduced Citrix SSL VPN pre-auth RCE successfully on both local and remote. Interesting bug!

    Poništi
  19. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    8. sij

    If a mentally unstable highschool dropout without degrees can get a job at Microsoft, anyone can achieve their dreams. Just got to keep going at it, even if you go half crazy.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·