Tweetovi

Blokirali ste korisnika/cu @Uday_infosec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Uday_infosec

  1. proslijedio/la je Tweet
    17. sij

    The magical fantasy land of Linux kernel testing by at Great overview of the kernel testing 2 corrections re syzbot: 1. there are no false positives, don't pick and choose, _every_ report is something to fix somewhere

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    14. sij

    Thanks everyone who joined recently! Here’s a treat for you. Put your security code review skills to the test with this quiz

    Poništi
  3. proslijedio/la je Tweet
    3. sij
    Poništi
  4. proslijedio/la je Tweet

    Gathered some of my proof-of-concepts and analysis notes on zero day vulnerabilities that I discovered or researched in the past few years, on my github: . Enjoy

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    2. sij

    Awesome Burp Suite Resources. 400+ open source Burp plugins, 500+ posts and videos.

    Poništi
  6. proslijedio/la je Tweet
    19. pro 2019.

    Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): Hoping to spread the RE fever :)

    Poništi
  7. proslijedio/la je Tweet
    20. pro 2019.

    Reverse Engineering Resource Collection. 3000+ open source tools, ~600 blog posts.

    Poništi
  8. proslijedio/la je Tweet
    19. pro 2019.

    Last year wrote about 21 methods that could lead to . Gerben Kleijn discovered that those 21 methods could be grouped into 5 categories. Learn more about his findings & how to securely set up user permissions.

    Poništi
  9. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  10. proslijedio/la je Tweet
    13. pro 2019.

    I wrote a thing about JSC exploitation (including how to leak StructureID) and Safari sandbox escape.

    Poništi
  11. proslijedio/la je Tweet
    13. pro 2019.
    Odgovor korisniku/ci

    I threw together a Dockerfile and instructions to make building the fuzzers easier: Lemme know if you run into trouble!

    Poništi
  12. proslijedio/la je Tweet
    12. pro 2019.

    Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing -

    Poništi
  13. proslijedio/la je Tweet
    Poništi
  14. proslijedio/la je Tweet
    11. ožu 2018.
    Poništi
  15. proslijedio/la je Tweet
    11. pro 2019.

    📚 tl;dr sec 17! * Had a blast on with & * WEASEL, a DNS covert channel implant for red teams * monitor anomalous behavior w/ CloudTrail * : 's GuardDuty automation

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    10. pro 2019.

    Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! More than 3000 tools and about 600 posts.

    Poništi
  17. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  18. proslijedio/la je Tweet
    9. pro 2019.

    Maintaining Cryptographic Library For 11 Languages: Fun Stories And Epic Bugs - Anastasiia Voitova

    Poništi
  19. proslijedio/la je Tweet
    7. pro 2019.

    I just published GraphQL vs REST API model, common security test cases for GraphQL endpoints . ,

    Poništi
  20. proslijedio/la je Tweet
    2. pro 2019.

    wtsxDev/reverse-engineering: List of awesome reverse engineering resources

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·