crazy rabbidz

@_hugsy_

/me likes computer

github.com/hugsy
Vrijeme pridruživanja: rujan 2011.

Tweetovi

Blokirali ste korisnika/cu @_hugsy_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_hugsy_

  1. Prikvačeni tweet
    11. kol 2019.

    Released the materials for the by and I: modern debugging with (), including the cheatsheet to get you started. Thanks to all of those who attended, and feedback are always welcome!

    Poništi
  2. proslijedio/la je Tweet
    prije 11 sati

    Our first blog post of 2020 is out! Learn about how we discovered a heap overflow in the F-Secure Internet Gatekeeper, which leads to unauthenticated RCE

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  4. proslijedio/la je Tweet
    11. ruj 2019.

    New blog post: Intercepting the Windows 10 (1903) System Service call using the weakness caused by the dynamic trace support

    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Yearly reminder that by is awesome sauce 👌

    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    29. sij

    I made a goose that destroys your computer Download it free here:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    27. sij

    PoC for CVE-2019-1125 (SWAPGS attack)

    Poništi
  9. proslijedio/la je Tweet
    27. sij

    we have an update to DTrace on Windows. with the latest 20H1 insider build, no more KD required to use dtrace on windows. plus arm64 MSI.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet

    Written by A "real" developer.

    Poništi
  11. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  12. 26. sij

    TIL nesting guests in -v VMs finally works! This is going to make research so much easier...

    Poništi
  13. proslijedio/la je Tweet
    23. pro 2014.
    Odgovor korisniku/ci

    OK, 1and1 supposedly has unlimited bandwidth, so here it goes! ~full Windows 10 TP Source Tree: . cc

    Poništi
  14. proslijedio/la je Tweet
    23. sij

    Sharing a new demo + an article on BlueKeep dissection (CVE-2019-0708) using REVEN. See how data Tainting, Memory History, and its Python API streamline the RE process to quickly and accurately analyze the root-cause and behavior at the system level.

    Poništi
  15. proslijedio/la je Tweet
    18. sij

    Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL" 🥳 Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)😎

    Poništi
  16. proslijedio/la je Tweet
    21. sij
    Poništi
  17. proslijedio/la je Tweet
    18. sij
    Poništi
  18. proslijedio/la je Tweet
    18. sij

    Windows kernel explorer: A free powerful Windows kernel research tool

    Poništi
  19. proslijedio/la je Tweet
    17. sij

    Vulnerability severity levels

    Poništi
  20. proslijedio/la je Tweet
    16. sij

    If you’re tired of hearing about crypto32, elliptic curves, and other CVE-2020-0601 shenanigans, have a read over our new blog post on Windows’ Intel CET implementation in the face of SetThreadContext and NtContinue. Come for the exploit mitigation, stay for the XState Internals.

    Poništi
  21. proslijedio/la je Tweet
    15. sij

    Fuck algebra. You can just set the base point to the public key of the cert you want to spoof. This is the best day.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·