Tweetovi

Blokirali ste korisnika/cu @Spy__Grl

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Spy__Grl

  1. proslijedio/la je Tweet
    4. velj

    Last year, researched and published a command-and-control module for SMB DOUBLEPULSAR. Since then, we've researched and reverse-engineered the RDP version of the implant. Today we're publishing that research and a module for it. Details:

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Analysis of a triple-encrypted AZORult downloader

    Poništi
  3. proslijedio/la je Tweet
    31. sij

    🚨It took Kraken Security Labs just 15 minutes to hack both of ’s crypto hardware wallets. Here’s how we did it and what it means if you’re a user:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers Hope you enjoy! As always ping me with any questions

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    My write up for NSA Codebreaker 2019. This year was designed around Android Apps and Public Key backdoors. This year I was able to complete all eight tasks, along with 3.2% of participants who finished task 1. 

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers, and show that high speed DMA attacks can bypass hardware protections on enterprise devices.

    Poništi
  7. 29. sij

    So motivated after watching this awesome webinar! Thanks

    Poništi
  8. proslijedio/la je Tweet
    29. sij

    She’s not really a believer in daily stand ups.

    Poništi
  9. proslijedio/la je Tweet
    26. sij
    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    26. sij

    Memhunter - Live Hunting Of Code Injection Techniques

    Poništi
  11. proslijedio/la je Tweet
    25. sij

    Good whitepaper about windows 10 secure kernel: "Live forensics on the Windows 10 securekernel (2017)"

    Poništi
  12. proslijedio/la je Tweet
    26. sij

    Binary exploitation exercise write-ups for beginners

    Poništi
  13. proslijedio/la je Tweet
    27. sij
    Poništi
  14. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    24. sij

    For anyone reversing or researching AES, here is a repo with notes, reference links and compiled executables with corresponding PDBs. I hope it is helpful.

    Poništi
  16. proslijedio/la je Tweet
    24. sij
    Poništi
  17. proslijedio/la je Tweet
    22. sij

    Learn to write your first OS kernel (minimalist kernel) : Kernels 101 – Let’s write a Kernel : cc

    Poništi
  18. proslijedio/la je Tweet

    My analysis of Remote Desktop Gateway RCE bugs CVE-2020-0609 & CVE-2020-0610 is up.

    Poništi
  19. proslijedio/la je Tweet
    19. sij
    Poništi
  20. proslijedio/la je Tweet
    18. sij

    Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL" 🥳 Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)😎

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·