SensePost

@sensepost

Work like hell, Share all you know, Abide by your handshake, Have fun. - Dan Geer

South Africa & United Kingdom
Vrijeme pridruživanja: svibanj 2010.

Tweetovi

Blokirali ste korisnika/cu @sensepost

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sensepost

  1. 27. sij

    One day was bored, so he looked around his room - a few days later, he had reversed how his Playstation streamed audio to it's dualshock controller An epic walkthrough from idea to success.

    Poništi
  2. 27. sij

    In 2019, we trained over 500 students, that's nearly 10 students for every person employed at SensePost. What a privilege, thank you to all our students. We hope we make some small impact in your job/life/career.

    Poništi
  3. 24. sij
    Poništi
  4. proslijedio/la je Tweet
    12. pro 2019.

    What an incredible year filled with late nights, EPIC hacks, ridiculous one liners, admin:admin and many other wtfs together with the crew . I got to meet many amazing people, see amazing things and learn more than ever! But now, my couch needs me. Happy holidays!

    Poništi
  5. proslijedio/la je Tweet
    5. pro 2019.

    So, I updated BIRP from and , a great tool to test on mainframes, to use the latest versions of x3270 and the py3270 library

    Poništi
  6. proslijedio/la je Tweet
    2. pro 2019.

    I wrote a thing about getting shells through Logitech Unifying dongles. Let me know what you think!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    1. pro 2019.

    Team SP is assembled for EU. Look forward for meeting new and alumni students tomorrow. BlackHat’s setup operation is always a thing of beauty to watch in motion. cc

    Poništi
  8. 29. stu 2019.

    What , & spent their SenseCon doing - hacking Doom. From dynamic hooking to static patching all with Frida.

    Poništi
  9. 29. stu 2019.

    A compendium of peripheral RF hacking, past, present and future by the R0ganat0r ().

    Poništi
  10. 29. stu 2019.

    If it wasn't for a good cause ... Our mobro's final moments before the big shave.

    Poništi
  11. proslijedio/la je Tweet
    12. stu 2019.
    Poništi
  12. 12. stu 2019.

    A primer on from Including how he used it to find CVE-2019-15937/8 in the barebox bootloader & a t-shirt challenge.

    Poništi
  13. 6. stu 2019.

    The second session at the is our BlackOps Hacking - Master Level. Check out the details here:

    Poništi
  14. 6. stu 2019.
    Poništi
  15. proslijedio/la je Tweet
    1. stu 2019.

    Just another day in the office

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    1. stu 2019.

    Combining their hands-on hacking fundamentals course and enterprise infrastructure hacking course, will present an extended 4-day Training at in London, December 2-5.

    Poništi
  17. proslijedio/la je Tweet
    4. stu 2019.

    If you want to understand how criminals run hacking campaigns and emulate them, this course is for you. Register early to save on “BlackOps Hacking - Master Level” taught by at

    Poništi
  18. proslijedio/la je Tweet
    5. ruj 2019.

    After reading article about the multiple vulnerabilities in U-Boot I decided to learn some QL. This leads me to the discovery of CVE-2019-15937/15938 in the Barebox Bootloader, the power of QL/LGTM for variant analysis is amazing. Excited to keep playing with it.

    Prikaži ovu nit
    Poništi
  19. 29. lis 2019.

    If you are free in an hour join on this webinar!

    Poništi
  20. proslijedio/la je Tweet
    28. lis 2019.

    Gabriel has done an amazing job of writing up the recent history of wifi hacking and rogue AP attacks, as well as implementing them in his easy to use eap hammer tool.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·