Rocco Calvi

@TecR0c

Follow the white rabbit.

Ring 0
Vrijeme pridruživanja: ožujak 2010.

Tweetovi

Blokirali ste korisnika/cu @TecR0c

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @TecR0c

  1. proslijedio/la je Tweet

    Spread the word! Registrations for classes at spring and are now open! Check our schedules page for info:

    Poništi
  2. 17. lis 2019.

    Great initiative and support by and for our industry. Can’t wait for the findings to be published.

    Poništi
  3. proslijedio/la je Tweet
    15. lis 2019.

    CVE-2019-16078: Brave Browser AdBlock Out-of-Bounds read off by one byte vulnerability. Read our team's security advisory at

    Poništi
  4. 6. ruj 2019.
    Poništi
  5. proslijedio/la je Tweet
    3. ruj 2019.

    On an unrelated note, Apple is very difficult for outside researchers to work with. Several people, including myself, have given up on trying to help because we’re ignored completely. It’s like talking to a brick wall, eventually one of you will give up. (Hint: not the wall)

    Poništi
  6. 30. kol 2019.

    Another amazing year at getting to see old friends and watching amazing talks from leaders in the industry like etc. One of my favourite cons!

    Poništi
  7. proslijedio/la je Tweet
    24. kol 2019.

    Registration for Driven2Pwn @ HITB+ CyberWeek is now open!

    Poništi
  8. proslijedio/la je Tweet
    25. srp 2019.

    Don't just teach your students to read. Teach them to question what they read, what they study. Teach them to doubt. Teach them to think.

    Poništi
  9. 2. srp 2019.

    Had a great time at and meeting super cool people. See you next year !!! ✈️

    Poništi
  10. proslijedio/la je Tweet
    27. lip 2019.

    "Introduction to Reverse Engineering With Ghidra", my workshop, will be Friday, August 9, from 2:30PM to 6:30PM. Information and registration link below. Informational thread follows (1/9)

    Prikaži ovu nit
    Poništi
  11. 27. lip 2019.

    Highly recommend awesome automation with Binary Ninja training. Amazing class with loads of helpful info and tricks!

    Poništi
  12. proslijedio/la je Tweet
    25. lip 2019.

    Get a behind-the-scenes look at the work of Google’s Project Zero and a retrospective assessment of the impact this work has had, in this Briefing from Project Zero Team Lead, Ben Hawkes.

    Poništi
  13. proslijedio/la je Tweet

    We’ll be teaching the new 2019 version of windows heap exploit class in the US in September. Open for registration:

    Poništi
  14. proslijedio/la je Tweet
    17. lip 2019.

    CVE-2019-7230: The IDAL FTP server is to memory corruption through insecure use of user-supplied format strings. An attacker can abuse this functionality to bypass authentication or execute code on the server. Read full advisory

    Poništi
  15. 8. lip 2019.

    Taking me forever to clean up my computer files!!!

    Poništi
  16. proslijedio/la je Tweet
    10. tra 2019.

    is honoured to have and as friends of the event! And for those of you who missed the 2019 talks, dont miss the video recordings. cc:

    Poništi
  17. proslijedio/la je Tweet
    4. tra 2019.

    It's here! Ghidra source code released: This is an ongoing, supported project from . Looking forward to seeing the continued advancements and the innovation that occurs from the release.

    Poništi
  18. proslijedio/la je Tweet
    Poništi
  19. proslijedio/la je Tweet
    23. sij 2019.
    Poništi
  20. proslijedio/la je Tweet

    In the first of our top 5 bugs of 2018, breaks down a winning Pwn2Own entry from exploiting Microsoft Edge in a way that shouldn’t be possible.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·