0x5A1F

@Saif_Sherei

Security Stuff Engineer at Microsoft’s . opinions are based on experimental thought patterns resulting in delusional yet fun life choices

slowly look behind you
Vrijeme pridruživanja: svibanj 2010.

Tweetovi

Blokirali ste korisnika/cu @Saif_Sherei

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Saif_Sherei

  1. proslijedio/la je Tweet
    30. sij

    w00t! So excited to announce our new course at - Adversary Emulation and Active Defense! 4Day - Combining the spheres of offense and defense to teach core concepts.

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  3. proslijedio/la je Tweet

    We’re excited to announce the Xbox Bounty Program, which awards up to $20,000 for vulnerabilities in the Xbox network space. Find out more information:

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    has 151 trainings. We have 18. 18 of the best hacker trainings you can ever find. Early 🐦 prices are still available at ! Register now ➡️ RTs appreciated!

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  6. proslijedio/la je Tweet
    24. sij

    Mobius Strip Reverse Engineering is announcing public sessions for its Static Reverse Engineering and SMT-Based Binary Program Analysis training classes in May 2020 in Manassas, VA. More details can be found on our website:

    Poništi
  7. proslijedio/la je Tweet
    21. sij

    Here's your chance to hear tell the story of MS08-067 and finding exploits in crash reports :) And in case you missed the blog post he published a while ago:

    Poništi
  8. proslijedio/la je Tweet
    19. sij

    Co-wrote this OSINT analysis (with nice data visualization) about Facebook Coordinated Inauthentic Behavior (CIB) with - The data is available on GitHub! Twitter will be the next one. cc

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi
  10. proslijedio/la je Tweet
    16. sij

    My favorite articles are the ones that walks you through the author methodology and strategy to find/exploit bugs. This is the case for last post on Chrome IPC vulnerabilities:

    Poništi
  11. proslijedio/la je Tweet

    We have increased our Microsoft Edge bounty awards alongside today's general availability of the new Microsoft Edge. Find out more here:

    Poništi
  12. proslijedio/la je Tweet

    This month's updates includes CVE-2020-0601 affecting Windows 10. We have not seen it used in active attacks. Learn how this is one example of our partnership with researchers and industry to release quality security updates to help protect our customers.

    Poništi
  13. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  14. proslijedio/la je Tweet
    11. sij

    obsessed with this picture of a seal looking up

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    11. sij

    My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet

    We are excited to announce the Microsoft Identity Research Project Grant, a new opportunity in partnership with the security community to help protect Microsoft customers, with grant awards of up to $75,000 USD. For more information please visit

    Poništi
  18. proslijedio/la je Tweet
    9. sij

    My team is once more hiring vulnerability researchers for our Redmond WA office. This is for low-level OS/platform security research work on Windows and Azure. More details on what we do at . Apply directly at or DM me if interested!

    Poništi
  19. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  20. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·