CrystalSage

@PurplePontiff

Wannabe security researcher.

::1
Vrijeme pridruživanja: studeni 2017.

Tweetovi

Blokirali ste korisnika/cu @PurplePontiff

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @PurplePontiff

  1. 25. sij

    This is just brilliant! From 's XSS challenges 🙏

    Poništi
  2. 24. sij
    Prikaži ovu nit
    Poništi
  3. 24. sij

    Did I forget to mention how amazing Factorio's blog is? They release a section called Friday Facts in which they explain technical details of the game's development. Amazing...

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    3. velj 2017.

    static const char function[] = { 0xB8, 0x2A, 0x00, 0x00, 0x00, 0xC3 }; int main() { return ((int(*)())function)(); } // Does not crash!

    Poništi
  5. proslijedio/la je Tweet
    22. sij

    Yet another C quiz! Can you tell the output just by looking at the code? int main(void) { fork(); putchar('x'); fork(); return 0; } gcc prog.c && ./a.out Assume standard up to date Linux glibc implementation.

    Prikaži ovu nit
    Poništi
  6. 18. sij

    Me: "Totally prepared for the test!" The test:

    Poništi
  7. proslijedio/la je Tweet
    17. sij

    Scrolling innocently through a paper, when suddenly:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    13. sij

    Swap x and y without using a third variable. x = x^y y = y^x x = x^y where ^ is XOR.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    13. sij

    Just published a new video: Backdooring an IoT camera by creating a malicious firmware upgrade!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    10. sij

    Yo hackers! I've built a small website that has some challenges. 🔗 The main challenge for the week is `WW3` All upcoming challenges will be hosted there, so stay tuned :) Would love to know what you guys think. Have fun!

    Poništi
  12. proslijedio/la je Tweet
    10. sij

    The BLAKE3 cryptographic hash function :

    Poništi
  13. proslijedio/la je Tweet
    9. sij

    During a pentest I found an MD5 hash in a config file. hashcat found that the cleartext password is: cleartextpassword123 I tried to login several times unsuccessfully, when realized that the actual password is :3255013d82b3c3796649b2dfbf79f209 😀😀

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    8. sij

    "Rarely is anyone thanked for the work they did to prevent the disaster that didn't happen." -

    Poništi
  15. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  16. proslijedio/la je Tweet
    6. sij

    My first blog post! Bypassing AV via in-memory PE execution. I've created a tool to go along with the post and help automate creating undetected PEs, links inside the post 😉

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    4. sij

    "Your adversary does not wait for you to finish patching." - The Art of Cyber War

    Poništi
  18. proslijedio/la je Tweet
    5. sij

    A more in-depth look at the defacement. Went through a short history of the site, fingerprinted plugin versions, and reviewed a probable attack vector.

    Prikaži ovu nit
    Poništi
  19. 5. sij

    Building a BitTorrent client from the ground up in Go:

    Poništi
  20. Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·