pyno

@__pyno__

Pentester & infosec addicted 💻 Also love traveling 🌍 climbing 🧗 Music 🎸 Photos 📷

Earth
Vrijeme pridruživanja: lipanj 2013.

Tweetovi

Blokirali ste korisnika/cu @__pyno__

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @__pyno__

  1. 5. pro 2019.
    Poništi
  2. proslijedio/la je Tweet
    22. lis 2019.

    RPS - Rock Paper Sidechannel

    Poništi
  3. proslijedio/la je Tweet
    30. kol 2019.

    So people were infecting iPhone users for years undetected. I am not really surprised. I am always saying that the reason we have this illusion of iOS security is because the devices are not inspectable and there is little chance you will ever know you are infected.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    21. kol 2019.

    There was worldwide outcry when the Notre Dame cathedral was on fire. Why is there not the same level of outrage for the fires destroying the ?

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    12. kol 2019.

    Not sure if this is common knowledge, but I recently learned about Windows Server Core and suddenly running Windows in VMs/Bochs for research (instrumentation/fuzzing) became much more convenient. It's a lightweight/stripped down version of regular Windows with (almost) no GUI.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    22. lip 2019.
    Poništi
  7. proslijedio/la je Tweet

    Vehicle hit by Hellfire missile shows that wearing your seat belt is largely pointless

    Poništi
  8. proslijedio/la je Tweet
    29. tra 2019.
    Poništi
  9. proslijedio/la je Tweet
    18. tra 2019.

    Deeply sad about Notre Dame, but shocked at the hypocrisy of humanity. We destroy over 150 acres of rainforest every minute and do not give it a second thought, yet fall into mourning at the loss of a building.

    Prikaži ovu nit
    Poništi
  10. 17. tra 2019.
    Poništi
  11. proslijedio/la je Tweet
    13. tra 2019.

    Son, now that you're 6, it's time I taught you about SSH. This is how you ssh into the computer upstairs and play a loud sound on it to scare your sister.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    5. tra 2019.

    Btw. You can also use it offline! It’s pure JS, so all you need to do is save the source files. :) If you do, make sure to update the source files regularly to add bug fixes and new features.

    Poništi
  13. proslijedio/la je Tweet
    5. tra 2019.

    Some experiment yesterday of identifying filetypes by visualizing them first turning them into a PNG then feeding them to a Convolutional Neural Network (resnet)

    Poništi
  14. proslijedio/la je Tweet
    3. tra 2019.

    Guy approaches me while standing in line at coffee shop in Cancún. Him: my friend says you are a famous person. Is that true? Me: that depends on your definition of fame Him: will you show up on Google if I search your name? Me: yes Him (typing into phone): you are Tony Stark?

    Poništi
  15. proslijedio/la je Tweet

    Exploiting Internet Explorer by writing terrible RegEx

    Poništi
  16. proslijedio/la je Tweet

    This is the official Twitter account of the Web Security Academy - free web security training from the makers of . Follow for updates as we add new materials and labs to the Academy.

    Poništi
  17. proslijedio/la je Tweet
    5. ožu 2019.

    Starting a new tutorial series on Heap Exploitation. Part 1 is live! ✨ “Understanding the Glibc Heap Implementation”

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    7. velj 2019.

    From now on, if anyone describes hackers as men hunched over a computer with a black hoodie on, I will use this gif in reply. Thank you for creating gif gold.

    Poništi
  19. proslijedio/la je Tweet
    12. velj 2019.

    For those interested in coverage-guided fuzzing, I've just released CmpCov - an instrumentation module for clang/SanitizerCoverage, which breaks down CMP/strcmp()/etc. into bytes and writes the extra coverage data to standard .sancov files. Get it here:

    Poništi
  20. proslijedio/la je Tweet
    11. velj 2019.

    Finally, our SGX Malware paper is on () and the PoC on () for everyone to try. Not side channels in SGX but this time we can hide real malware in SGX.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·