Adrien Stoffel

@__awe

0daysober CTF team

Lausanne
Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @__awe

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @__awe

  1. proslijedio/la je Tweet
    24. sij

    Ever get a pointer to the middle of a struct? Just add the __shifted keyword to the variable's type definition!

    Poništi
  2. proslijedio/la je Tweet
    10. sij

    Insomni'hack 2020 is approaching. Don't miss this unique opportunity to learn about modern Linux exploitation during a 3-days training with

    Poništi
  3. proslijedio/la je Tweet
    2. sij

    Starting 2020 with a major website update @ and 3 new pwn challenges from & ! Enjoy!

    Poništi
  4. proslijedio/la je Tweet
    28. pro 2019.

    Our 36c3 presentation video : and slides: 😃 It's really a nice party. Hope to see you next year.

    Poništi
  5. proslijedio/la je Tweet
    21. pro 2019.

    Pwning VMWare, Part 1: RWCTF 2018 Station-Escape

    Poništi
  6. proslijedio/la je Tweet
    18. pro 2019.

    Registration for Insomni'hack 2020 is now OPEN: Full list of WORKSHOPS has been published. Talks selection and schedule coming soon...

    Poništi
  7. proslijedio/la je Tweet
    13. pro 2019.

    I wrote a thing about JSC exploitation (including how to leak StructureID) and Safari sandbox escape.

    Poništi
  8. proslijedio/la je Tweet
    18. stu 2019.

    The BabyKernel Windows exploitation challenge from last week's is up on GitHub:

    Poništi
  9. proslijedio/la je Tweet
    2. ruj 2019.

    The last part of our Attacking SSL VPN series is out - The Golden Pulse Secure SSL VPN RCE Chain, with Twitter as Case Study! "If you have a nuclear level weapon, when is it ready for public disclosure?"

    Poništi
  10. proslijedio/la je Tweet
    29. kol 2019.

    thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    7. kol 2019.
    Poništi
  12. proslijedio/la je Tweet
    8. kol 2019.

    Stuck in the sandbox? We've got your back! Deep dive analysis and full exploit of a Chrome IndexedDB race condition by and :

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    5. kol 2019.

    Here are the slides for my RECON and BlackHat presentation, "Automation Techniques in C++ Reverse Engineering":

    Poništi
  14. proslijedio/la je Tweet
    11. srp 2019.

    I wrote a thing about a Chakra RCE for which the JIT trigger is tweetable :) function opt(o) { o.pwn = o.a; }

    Poništi
  15. proslijedio/la je Tweet
    9. srp 2019.
    Poništi
  16. proslijedio/la je Tweet
    8. srp 2019.
    Poništi
  17. proslijedio/la je Tweet
    18. lip 2019.

    I have finally published a write-up of the Trinity exploit chain consisting of three stages and six different vulnerabilities!

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    7. lip 2019.

    I pushed the slides for my talk "A tale of Chakra bugs through the years" that I gave at , talk was given in french but slides are in english

    Poništi
  19. proslijedio/la je Tweet
    24. svi 2019.

    Le Sénégalais Amat Cama, étoile montante de la sphère des hackers : il a réussi à craquer une Tesla 3, le dernier modèle de la marque automobile d’Elon Musk.

    Poništi
  20. proslijedio/la je Tweet
    10. svi 2019.

    Project Zero guest blog: "Trashing the Flow of Data" by Stephen Röttger () -

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·