Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @New1sh
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @New1sh
-
Prikvačeni tweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hauger proslijedio/la je Tweet
I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64. https://github.com/0xb0bb/pwndra pic.twitter.com/o1JPjyjgga
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
#BugBounty2020Goals 1. $50k for bug bounty 2. Write 2 fuzz tool 3. Find a high Linux kernel vul 4. Find a RCE,and write expHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hauger proslijedio/la je Tweet
Recovering the SIM card PIN from the ZTE WF721 cellular home phone
#MobileSecurityhttps://ripitapart.com/2019/12/21/recovering-the-sim-card-pin-from-the-zte-wf721-cellular-home-phone/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hauger proslijedio/la je Tweet
New XMas release of frida-fuzzer: 1.2
https://github.com/andreafioraldi/frida-fuzzer/releases …
A release with Android fuzzing in mind. Moar speed for remote (e.g. with adb) and ARM fuzzing and support to dictionaries.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hauger proslijedio/la je Tweet
Check out stacktraceflow_sourcetrail by Baranovski, which combines Valgrind and Sourcetrail to quickly produce interactive callgraphs for e.g. Rust and Go Video: https://streamable.com/gvn9o Repository:https://github.com/Baranowski/stacktraceflow_sourcetrail …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hauger proslijedio/la je Tweet
GitHub - 0vercl0k/CVE-2019-11708: Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit. -https://github.com/0vercl0k/CVE-2019-11708/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hauger proslijedio/la je Tweet
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs. https://github.com/0vercl0k/CVE-2019-11708 …pic.twitter.com/LeAOCgqpMG
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hauger proslijedio/la je Tweet
BlueMaster: Bypassing and Fixing Bluetooth-based Proximity Authentication
#MobileSecurity#AndroidSecurity#BHEU2019 by Y. Jung, J. Shin and Y. Jang SLIDES: https://i.blackhat.com/eu-19/Thursday/eu-19-Jung-BlueMaster-Bypassing-And-Fixing-Bluetooth-Based-Proximity-Authentication.pdf … Whitepaper: https://i.blackhat.com/eu-19/Thursday/eu-19-Jung-BlueMaster-Bypassing-And-Fixing-Bluetooth-Based-Proximity-Authentication-wp.pdf …pic.twitter.com/vbn2ujlV1S
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hauger proslijedio/la je Tweet
OpenSSL CVE-2019-1551: Incorrect consttime modular exponentation, found after 1.5 years of bignum fuzzing at OSS-Fuzzhttps://github.com/openssl/openssl/pull/10574 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hauger proslijedio/la je Tweet
New tricks necessary for debugging v8 with lldb recently: To map the source: (lldb) settings set target.source-map "../../" "/path/to/v8/dir" Somehow v8::internal::Object is now ambiguous, so: (lldb) p _v8_internal_Print_Object(*((void**)(v8_local.val_)))
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hauger proslijedio/la je Tweet
Analyzing Android's CVE-2019-2215 (/dev/binder UAF)
#MobileSecurity#AndroidSecurity [writeup] by@SpecterDev https://dayzerosec.com/posts/analyzing-androids-cve-2019-2215-dev-binder-uaf/ …pic.twitter.com/HPd7jArpGo
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hauger proslijedio/la je Tweet
LLDBFuzzer: Debugging and Fuzzing the Apple Kernel with LLDB Scripthttps://blog.trendmicro.com/trendlabs-security-intelligence/lldbfuzzer-debugging-and-fuzzing-the-apple-kernel-with-lldb-script/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Hauger proslijedio/la je Tweet
Chrome 0-day exploit was used in
#WizardOpium operation. Details https://securelist.com/chrome-0-day-exploit-cve-2019-13720-used-in-operation-wizardopium/94866/ …pic.twitter.com/EXKoHQgM7c
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Too tired~
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hauger proslijedio/la je Tweet
iOS 13.1.3 Safari EoP PoC. - English version. by:
@S0rryMybadhttps://drive.google.com/file/d/1m_NymXBTCK7rgCR3Swd9N5IyQ7miAmW5/view …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hauger proslijedio/la je Tweet
Race Condition in Web Applications https://lab.wallarm.com/race-condition-in-web-applications/ …pic.twitter.com/gaLTKdl0IL
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hauger proslijedio/la je Tweet
"Systematic Comparison of Symbolic Execution Systems: Intermediate Representation and its Generation" from
@poeplau and@aurelsec Worthwhile read comparing symbolic execution engines KLEE, S2E, angr, and Qsym. http://s3.eurecom.fr/docs/acsac19_poeplau.pdf …pic.twitter.com/JJjSEvkkPt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

The source code is available on GitHub: