Stephen Sims

@Steph3nSims

Perpetual Information Security Student | SANS Fellow | Musician | Braggart Hater

Berkeley, CA
Vrijeme pridruživanja: veljača 2014.

Tweetovi

Blokirali ste korisnika/cu @Steph3nSims

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Steph3nSims

  1. 30. sij
    Poništi
  2. 27. sij

    10 seats left for the beta run of SANS SEC588 - Cloud Penetration Testing starting on March 23rd in Arlington, VA. These seats will be gone this week. This first beta run is 50% off.

    Poništi
  3. 22. sij

    The second beta run of the new course "SEC699: Purple Team Tactics - Adversary Emulation for Breach Prevention & Detection" is set for Austin in April. A good opportunity to get a course at 25% off.

    Poništi
  4. 21. sij
    Poništi
  5. 19. sij

    A great Windows 10 heap grooming and exploitation blog post by in case you missed it last year:

    Poništi
  6. proslijedio/la je Tweet
    18. sij

    New Internet Explorer 0day and advisory out. Exploited in wild. No patch from Microsoft. Mitigation is to not use IE. CVE-2020-0674

    Poništi
  7. 16. sij

    I'm very excited to announce the release of the highly anticipated SANS SEC588 - Cloud Penetration Testing course. Congratulations to on completing it. Watch for the beta announcement date soon:

    Poništi
  8. proslijedio/la je Tweet
    15. sij
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    We have increased our Microsoft Edge bounty awards alongside today's general availability of the new Microsoft Edge. Find out more here:

    Poništi
  10. 15. sij

    Great webcast from and on the crypt32.dll vulnerability today: Thanks for always giving back to the community!

    Poništi
  11. 1. sij

    Watching the Times Square NYE and all of the lip syncing makes me respect so much more for her performance a few years ago!

    Poništi
  12. 24. pro 2019.

    So many new devices coming online in a few hours! 🤤

    Poništi
  13. 23. pro 2019.

    Check out the new 2020 syllabus for SEC760 "Advanced Exploit Development for Penetration Testers"...! The course now comes bundled with IDA Pro! ...and co-authorship and contributions from and

    Poništi
  14. proslijedio/la je Tweet
    16. pro 2019.

    A nice write-up on WinAFL setup for fuzzing popular image viewers resulting in quite a few bugs.

    Poništi
  15. proslijedio/la je Tweet
    13. pro 2019.

    🔴 WE ARE LIVE! 🔴 The gates to Elf University are open at

    Poništi
  16. 6. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    25. stu 2019.

    CFP for is open. Come to Denver June 1-2 to share your latest research in OFFSEC. I look forward to seeing a talk on advances in and success stories about / automation tools.

    Poništi
  18. proslijedio/la je Tweet
    2. pro 2019.

    Registration for HeapME is now open. In order to use it you'll need my GEF fork while I do the PR.- Sample HeapME URL demonstrating how2heap's glibc malloc's first-fit behavior

    Poništi
  19. proslijedio/la je Tweet
    26. stu 2019.

    Very excited to announce that I will officially be joining as a Senior DevOps Engineer, working for on courseware development!

    Poništi
  20. 25. stu 2019.

    Thanks and for teaching SEC660 and SEC760 at SANS HackFest this week. If you ever get a chance to attend a talk or a class from these guys it is time well spent.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·