Hexabin

@TheRealHexabin

Software Engineer by day (Android). Exploit magician by night. Enjoys writing code, making cool electronics and popping shells

/dev/block/mmcblk0p16
Vrijeme pridruživanja: rujan 2016.

Tweetovi

Blokirali ste korisnika/cu @TheRealHexabin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @TheRealHexabin

  1. 31. sij

    I'm taking the rest of the day from hacking to sip some whiskey and give my brain a break.

    Poništi
  2. 31. sij

    I've learned a lot playing in the already. It's hard but just when I feel like I can't go on I find something.

    Poništi
  3. 31. sij

    I spent probably 8 hours on the Metasploit CTF and I am close to only one flag. I have the creds but no exploit. 🤬

    Poništi
  4. 30. sij
    Poništi
  5. 30. sij

    Who's all going to be hacking in the today? I plan on taking a long lunch this afternoon to get started.

    Poništi
  6. 29. sij

    Got Kali 2020.1 setup yesterday with all my lovely tools. I really dig the new look and feel.

    Poništi
  7. 28. sij

    I want to take a look at BlueGate (CVE: 2020-0610, 2020-0610) when I get some free time and found we can get free Windows Server virtual machines. Nice!

    Poništi
  8. 28. sij

    Working Eng. Support is sometimes fulfilling but most times makes me want to pull my hair out. Ahhhhh!

    Poništi
  9. 28. sij

    This is great stuff. I am going to play with it this weekend. I didn't know MS5 has the option for encrypting payloads.

    Poništi
  10. 23. sij

    Labyrinth is a hacker movie. Sarah meets ASLR

    Prikaži ovu nit
    Poništi
  11. 22. sij

    Did Jeff Bezo's get hacked with a stack buffer overflow exploit? You'd think this attack vector wouldn't work anymore. 🤭

    Poništi
  12. 22. sij

    Who's all ready for this next week? I can't wait!

    Poništi
  13. 21. sij

    It takes a lot of trial and error to get unicode exploits to work the way you want. I've spent a lot of hours trying to create an exploit for my next blog article. 😩

    Poništi
  14. 19. sij

    When your exploit finally works. This GIF never gets old 🤣😂

    Poništi
  15. 18. sij

    I love working with software exploits. I'm still just a noob and I know how hard it is to understand. That's why I created my blog. I hope to fill in any blanks a person new to exploit dev may find that I already know about. If there is still difficulty, my DMs are always open!

    Poništi
  16. 18. sij

    I really wanted to write this one. This is Part 2 of my series on Windows Exploit Dev: SEH Buffer Overflows. For this example, I used an exploit I wrote myself.

    Poništi
  17. 18. sij

    I just opened my blog and finished an article on An Intro to Buffer Overflows. Let me know what you think!

    Poništi
  18. 16. sij

    Here is my first personally built exploit and it's for AVS Audio Converter 9.1. I will be using this example in my SEH Buffer Overflow tutorial on my site.

    Poništi
  19. 16. sij

    For the month of Jan. I've been assigned to engineering support. It's been studying bugs all day and writing fixes. Today, by far, has been the busiest and all I want to do is hack 😪

    Poništi
  20. 15. sij

    My new site should be up by next week. It's a blog about exploit development, with Metasploit and all things . A way for me to share my strategies and processes when in attack mode.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·