Tweetovi

Blokirali ste korisnika/cu @_gauravb_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_gauravb_

  1. proslijedio/la je Tweet
    9. ruj 2019.

    Patch-gapping in practice: Google Chrome edition (by of our nDay team)

    Poništi
  2. proslijedio/la je Tweet
    8. srp 2019.

    We’re still growing, and looking for more elite researchers. Check out the job openings at

    Poništi
  3. proslijedio/la je Tweet
    28. svi 2019.
    Poništi
  4. proslijedio/la je Tweet
    20. svi 2019.

    Check out part 1 of the blog post by for his winning Pwn2Own entry on Edge (sbx part2 coming next)

    Poništi
  5. proslijedio/la je Tweet
    17. svi 2019.

    . of our Nday team exploits the recently patched CVE-2019-0808 win32k bug to escape the chrome sandbox

    Poništi
  6. proslijedio/la je Tweet
    11. tra 2019.

    If you're at zer0con this week, stop by and check out talk on exploiting Magellan bug on Chrome

    Poništi
  7. proslijedio/la je Tweet
    3. tra 2019.

    So of our nDay team is back at it - this time with a chrome 1day exploit that targets the latest stable version

    Poništi
  8. proslijedio/la je Tweet
    20. ožu 2019.

    of our Nday team takes a closer look at the recently patched Chrome vulnerability spotted in the wild (exploit included)

    Poništi
  9. proslijedio/la je Tweet
    23. sij 2019.

    of our Nday Team details exploiting the recently patched Magellan bug on 64-bit Chrome Desktop (exploit included)

    Poništi
  10. proslijedio/la je Tweet
    14. stu 2018.

    Here's a high level outline of what I'll be teaching. My goal is to convey the thought process behind identifying vulnerabilities within embedded devices and developing exploits for them. Device 1 - MIPS (Real-time OS) [Outline Pending] Device 2 - ARMv7 (Linux)

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    16. lis 2018.
    Poništi
  12. proslijedio/la je Tweet
    9. lis 2018.

    After a good amount of feedback and requests, we have decided to move our Intro to Embedded System training back to Feb 18, 2019. We have also extended the early ticket discount to reflect the new dates.

    Poništi
  13. proslijedio/la je Tweet
    24. ruj 2018.

    “Any fool can write code that a computer can understand. Good programmers write code that humans can understand.” – Martin Fowler

    Poništi
  14. proslijedio/la je Tweet
    13. ruj 2018.
    Poništi
  15. proslijedio/la je Tweet
    10. ruj 2018.

    Our Nday team has uncovered a failed patch in TrueKey. It has been reported and a patch was attempted. Read more:

    Poništi
  16. proslijedio/la je Tweet
    5. ruj 2018.

    Excited to announce the second embedded training by . The training has been modified to include cases for both ARMv7 and MIPS. Also, any logic based case(s) from the previous training has been replaced with memory corruption based case(s).

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    5. ruj 2018.

    Announcing our 2nd training for 2018: Introduction to Embedded Exploitation. Taught by David Barksdale and

    Poništi
  18. proslijedio/la je Tweet
    30. tra 2018.

    Our fuzzers need some TLC. We're looking to hire a master fuzzer. Remote/International applications accepted. Apply to info@exodusintel.com

    Poništi
  19. proslijedio/la je Tweet
    3. tra 2018.

    We have an open position on our N-Day research team. If you have experience understanding and exploiting known/patched vulnerabilities, please apply to info@exodusintel.com

    Poništi
  20. proslijedio/la je Tweet
    19. velj 2018.

    We are excited to welcome as our newest addition to the Exodus Vulnerability Research Team!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·