Tweetovi

Blokirali ste korisnika/cu @Nosoynadiemas

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Nosoynadiemas

  1. proslijedio/la je Tweet
    30. sij

    Are you in Brussels this Saturday evening? Join us for a GitHub networking event. No sales, no product, just chat with GitHubbers and with your peers, about your needs as open source maintainers, such as securing your open source projects.

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!

    Poništi
  3. proslijedio/la je Tweet
    28. sij

    Check out ' tips on Fuzzing, to overcome known challenges and maximize results:

    Poništi
  4. proslijedio/la je Tweet
    24. sij

    We're closing out the week strong by announcing the Open Source Security Coalition's latest partners: and !

    Poništi
  5. proslijedio/la je Tweet
    23. sij
    Poništi
  6. proslijedio/la je Tweet
    15. sij

    Assert yourself on the browser playground with ’s guide to hunting Chrome IPC sandbox escapes:

    Poništi
  7. proslijedio/la je Tweet
    17. sij

    The lightning talks will be recorded, and live-streamed here! Mark the time: We'll start broadcasting Wednesday Jan 22, 6.30 pm. See you there!

    Poništi
  8. proslijedio/la je Tweet
    17. sij

    My blog post about CVE-2020-0601 is online! I hope you guys enjoy it, I didn't sleep for 2 days now, pardon me if I made some mistakes :) Feel free to point out any mistakes!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    16. sij

    My favorite articles are the ones that walks you through the author methodology and strategy to find/exploit bugs. This is the case for last post on Chrome IPC vulnerabilities:

    Poništi
  10. proslijedio/la je Tweet
    14. sij

    Congrats to our CTF winners! 1st place goes to , with an impressive query, with tests and exploits! 2nd place goes to who took the time to give very detailed explanations. Well done guys! Hope you had fun! Solutions are coming soon

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    8. sij

    We are excited to announce that , will be presenting "Breaking SAML (.NET Edition)" at the GitHub Security Meetup, Jan 22 San Francisco.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    10. sij

    Awesome line-up of speakers for the GitHub Security Meetup, January 22 in San Francisco:

    Poništi
  13. proslijedio/la je Tweet
    10. sij

    Thank you all for the best wishes. I will be joining a team of great security researchers at . Excited to start contributing to a better and more secure OSS!

    Poništi
  14. proslijedio/la je Tweet
    7. sij

    We are thrilled to announce that , from Google Project Zero, will be presenting "Researching Local Windows RPC in PowerShell" at the GitHub Security Meetup, Jan 22 San Francisco. Get your free ticket at

    Poništi
  15. proslijedio/la je Tweet
    3. sij

    Want to know more about our upcoming security meetup? Check out this presentation given by at the previous one: Let us know if you want to present yourself a 10-15 min ligthning talk.

    Poništi
  16. proslijedio/la je Tweet
    17. pro 2019.

    A wild new version of Fuzzowski with a lot of changes appeared! - Now you can also define Responses to requests, that sets vars and help to build stateful fuzzers - All data (mutants) generation, and Fuzzing Session fully recoded! /cc

    Poništi
  17. proslijedio/la je Tweet
    17. pro 2019.

    Part 2 of the "whoopsie-daisy" series. This one is about exploiting a TOCTOU. It includes some info about user ids (RUID/EUID/SUID), signals (SIGSEGV/SIGTRAP), advisory file locks, and inotify.

    Poništi
  18. proslijedio/la je Tweet

    HackerOne is coming to Spain! The first live hacking meetup in Madrid is happening this weekend. 25 hackers getting together, developing skills, and collaborating while hacking. Target: Verizon Media Huge thanks to for hosting! 🇪🇸👩🏻‍💻 💪🏽

    Poništi
  19. proslijedio/la je Tweet
    5. pro 2019.

    Thanks to 's PR hashcat now has a 100% pure GPU implementation of ECC secp256k1. All instructions are executed on GPU without any CPU hook code. Performance on Electrum 4/5 Wallet cracking improved from 49kH/s to 201kH/s

    Poništi
  20. proslijedio/la je Tweet
    5. pro 2019.

    You know why AddressSanitizer is a success? Valgrind/PIN did same before and fat-pointers give much better (sound) properties. B/c it takes 380 LOC to port to new OS kernel w/ build files, headers, debug code and a test: Ultimate win of vision

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·