Tweetovi

Blokirali ste korisnika/cu @RZamolxes

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @RZamolxes

  1. proslijedio/la je Tweet
    prije 12 sati

    iCloud Bypass on Linux -sudo apt install libusbmuxd-tool -iproxy 2022 44 NEW TERM TAB -ssh root@localhost -p 2022 -pass: alpine -mount -o rw,union,update / -echo "" >> /.mount_rw -mv /Applications/Setup.app/Setup /Applications/Setup.app/Setup.bak -uicache -a -killall backboardd

    Prikaži ovu nit
    Poništi
  2. 4. velj
    Poništi
  3. proslijedio/la je Tweet
    3. velj

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  4. 3. velj
    Poništi
  5. proslijedio/la je Tweet
    1. velj

    Windows 10 UAC bypass for all executable files which are autoelevate true.

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    Thanks for n1ghtshade

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    OpenBSD Mail Server Bug Allowed Remotely Executing Shell Commands As Root

    Poništi
  8. 31. sij
    Poništi
  9. proslijedio/la je Tweet
    30. sij
    Poništi
  10. proslijedio/la je Tweet
    29. sij
    Poništi
  11. proslijedio/la je Tweet
    29. sij

    Interesting vulnerability: may_create_in_sticky() was done when we already have dropped the ref to dir and thus dir (a struct dentry ptr) might be freed and reuse. One impact is a 1-bit infoleak oracle in open() (CVE-2020-8428)

    Poništi
  12. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  13. 28. sij
    Poništi
  14. proslijedio/la je Tweet
    27. sij

    Can't wait to present the progress we've made since at ! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.

    Poništi
  15. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  16. 26. sij
    Poništi
  17. proslijedio/la je Tweet
    13. sij
    Poništi
  18. proslijedio/la je Tweet
    23. sij

    PoC (Denial-of-Service) for CVE-2020-0609 & CVE-2020-0610 Please use for research and educational purpose only.

    Poništi
  19. proslijedio/la je Tweet
    23. sij

    So escalating privs on cheap Android phones hasn't changed much I see? Phone "passed" the CTS tests, other than, ya know, it has the CTS app still on it, and it's a system app signed by a test key that is publicly known...

    Prikaži ovu nit
    Poništi
  20. 23. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·