mgp25

@_mgp25

Trying harder… GPG: 0x8A730B8F

Spain
Vrijeme pridruživanja: rujan 2009.

Tweetovi

Blokirali ste korisnika/cu @_mgp25

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_mgp25

  1. 30. sij

    Facebook has taken down my Github repository about Instagram API: Here the DCMA notice: Reverse engineering should be a user right, we don’t know if apps are violating user privacy or backdooring our devices.

    Poništi
  2. proslijedio/la je Tweet
    23. sij
    Poništi
  3. proslijedio/la je Tweet
    13. sij

    My 40 minute deep dive into "fake" chips is up! Been working on this on and off for 3 years. It might spark some controversy.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    15. sij

    Ghidra Script that sets the names for missing function names by looking for relevant patterns in the binary! Hope that will help you too :)

    Poništi
  5. proslijedio/la je Tweet
    15. sij

    Using a KerberosSDR to Monitor Air Traffic Control Voice, ADS-B, ACARS & VDL2 Simultaneously on a Raspberry Pi 3B+

    Poništi
  6. proslijedio/la je Tweet
    15. sij
    Poništi
  7. proslijedio/la je Tweet
    14. sij

    This you are strongly encouraged to implement the recently released CVE-2020-0601 patch immediately.

    Poništi
  8. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  9. proslijedio/la je Tweet
    12. sij
    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    11. sij

    1. Never stop learning. 2. See failure as a beginning. 3. Teach others what you know. 4. Assume nothing, question everything. 5. Analyze objectively. 6. Practice humility. 7. Respect constructive criticism. 8. Love what you do. 9. Give credit where it's due. 10. Take initiative.

    Poništi
  11. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  12. proslijedio/la je Tweet
    9. sij
    Poništi
  13. proslijedio/la je Tweet
    6. sij

    Breaking PHP's mt_rand() with 2 values and no bruteforce

    Poništi
  14. proslijedio/la je Tweet
    3. sij

    Reverse Engineering Encrypted Code Segments: by Ryan Cornateanu

    Poništi
  15. proslijedio/la je Tweet
    3. sij

    My JWT talk at HITB Abu Dhabi is published! Practical Approaches For Testing And Breaking JWT Authentication

    Poništi
  16. proslijedio/la je Tweet
    21. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    28. pro 2019.
    Odgovor korisniku/ci

    They really are just so afraid that someone will inspect FairPlay encryption at runtime, clear out their obfuscation and burn down their monopoly in flames, aren’t they? If they cared about security, they would allow researchers to inspect their devices.

    Poništi
  18. proslijedio/la je Tweet

    Windows Defender killing Outlook process because of the usage of an authentication certificate with CN=.., O=mimikatz, ... ✅ "Internal behavior"

    Poništi
  19. proslijedio/la je Tweet
    25. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    24. pro 2019.

    PoC||GTFO 20 is now in print! Get it in Leipzig this week, or in Washington DC at the end of January.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·