R0 CREW

@R0_CREW

A community of low-level information security researchers.

Earth, Solar System
Vrijeme pridruživanja: lipanj 2010.

Tweetovi

Blokirali ste korisnika/cu @R0_CREW

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @R0_CREW

  1. 26. pro 2019.

    JEB 3.7.0 Merry Xmas Edition by DimitarSerg

    Poništi
  2. proslijedio/la je Tweet
    24. lis 2019.

    Our team represented by published technical analysis of the checkm8 exploit

    Poništi
  3. proslijedio/la je Tweet
    23. lis 2019.
    Poništi
  4. proslijedio/la je Tweet
    23. lis 2019.
    Poništi
  5. proslijedio/la je Tweet
    23. lis 2019.

    Windows 10 (RS1-19H2+) UAC bypass using EditionUpgradeManager undocumented autoelevated COM interface. Works together with environment variables spoofing,

    Poništi
  6. proslijedio/la je Tweet
    23. lis 2019.

    Хвала победителям и подробный разбор заданий Hackquest ZeroNights 2019:

    Poništi
  7. proslijedio/la je Tweet
    22. lis 2019.

    Here is the news we’ve all been waiting for – the program of the conference is finally published! Please RT!

    Poništi
  8. proslijedio/la je Tweet
    ARM-X Architecture
    ARM-X Launcher Menu
    IP Camera "booted up"
    IP Camera Admin Interface
    Poništi
  9. proslijedio/la je Tweet
    22. lis 2019.

    Published the write-up of PoE - Path of Exploitation for HITCON CTF! Includes why and how I designed these challenges and how to exploit from the userspace program, the kernel, to QEMU!

    Poništi
  10. proslijedio/la je Tweet
    22. lis 2019.

    We are proud to share a NTFS in MFT parsing! You too, plug a USB key and BSOD (probably not exploitable by plug&pwn)! Microsoft WONTFIX [EN] [FR]

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    22. lis 2019.

    Freshly patched RCE in PHP-FPM: Exploit: Many nginx+PHP configurations vulnerable, watch out!

    Poništi
  12. proslijedio/la je Tweet

    An binary-to-LLVM IR lifter that leverages Ghidra's IR and analysis < Well this could be nifty

    Poništi
  13. proslijedio/la je Tweet
    17. lis 2019.

    The fuzzy C/C++ code analysis platform Joern has been resurrected! - many thanks to and !

    Poništi
  14. proslijedio/la je Tweet
    23. lis 2019.

    OFFZONE 2020 — April 16-17, Moscow, Russia. Save the date! 🗓 📝Call for Papers is now officially open — get your talk proposals submitted 📜👉🏻 Make sure to check out Speaker Benefits and CFP Principles ➡️ See you at OFFZONE 2020!

    Poništi
  15. proslijedio/la je Tweet
    8. lis 2019.

    I've digged up some ancient versions of Adobe Reader to figure out exactly which symbols were public in which builds and when. Turns out all the core modules had them at some point. My full analysis on the P0 blog:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    7. lis 2019.
    Poništi
  17. proslijedio/la je Tweet
    8. lis 2019.

    The IDApython cheat sheets from Pavel Rusanov are now available as PDFs.

    Prikaži ovu nit
    Poništi
  18. 7. lis 2019.

    Our task was put up for the . Can you solve it? RT plz

    Poništi
  19. proslijedio/la je Tweet
    3. lis 2019.

    Debug registers in production A11 iPhones allow full-featured kernel debugging

    Poništi
  20. proslijedio/la je Tweet
    18. ruj 2019.

    Frida 12.7 is out with a brand new CModule API, and ~100x faster ObjC.choose()

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·