Hauger

@New1sh

find vulnerability in aosp and kernel

Vrijeme pridruživanja: listopad 2019.

Tweetovi

Blokirali ste korisnika/cu @New1sh

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @New1sh

  1. Prikvačeni tweet
    2. pro 2019.

    My second high severity vul 😄

    Poništi
  2. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  3. 30. pro 2019.

    1. $50k for bug bounty 2. Write 2 fuzz tool 3. Find a high Linux kernel vul 4. Find a RCE,and write exp

    Poništi
  4. proslijedio/la je Tweet
    26. pro 2019.
    Poništi
  5. proslijedio/la je Tweet
    24. pro 2019.

    New XMas release of frida-fuzzer: 1.2 🎉 A release with Android fuzzing in mind. Moar speed for remote (e.g. with adb) and ARM fuzzing and support to dictionaries.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    9. pro 2019.

    Check out stacktraceflow_sourcetrail by Baranovski, which combines Valgrind and Sourcetrail to quickly produce interactive callgraphs for e.g. Rust and Go Video: Repository:

    Poništi
  7. proslijedio/la je Tweet
    6. pro 2019.

    GitHub - 0vercl0k/CVE-2019-11708: Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit. -

    Poništi
  8. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  9. proslijedio/la je Tweet
    5. pro 2019.
    Poništi
  10. proslijedio/la je Tweet
    5. pro 2019.

    OpenSSL CVE-2019-1551: Incorrect consttime modular exponentation, found after 1.5 years of bignum fuzzing at OSS-Fuzz

    Poništi
  11. proslijedio/la je Tweet
    25. stu 2019.

    New tricks necessary for debugging v8 with lldb recently: To map the source: (lldb) settings set target.source-map "../../" "/path/to/v8/dir" Somehow v8::internal::Object is now ambiguous, so: (lldb) p _v8_internal_Print_Object(*((void**)(v8_local.val_)))

    Prikaži ovu nit
    Poništi
  12. 18. stu 2019.
    Poništi
  13. proslijedio/la je Tweet
    9. stu 2019.
    Poništi
  14. proslijedio/la je Tweet
    8. kol 2019.
    Poništi
  15. 8. stu 2019.
    Poništi
  16. proslijedio/la je Tweet
    1. stu 2019.
    Poništi
  17. 31. lis 2019.

    Too tired~

    Poništi
  18. proslijedio/la je Tweet
    30. lis 2019.
    Poništi
  19. proslijedio/la je Tweet
    31. lis 2019.
    Poništi
  20. proslijedio/la je Tweet
    28. lis 2019.

    "Systematic Comparison of Symbolic Execution Systems: Intermediate Representation and its Generation" from and Worthwhile read comparing symbolic execution engines KLEE, S2E, angr, and Qsym.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·