Tweetovi

Blokirali ste korisnika/cu @_murks

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_murks

  1. proslijedio/la je Tweet

    Stay tuned! Tomorrow we open the first door of our Java Security Advent Calendar 2019! 👉

    Poništi
  2. proslijedio/la je Tweet
    28. ruj 2019.

    Get things done like . 1: agree to give a presentation on how you solved a problem. 2: Solve the problem. 3: Present. now available as a library. 🍾

    Poništi
  3. 19. srp 2019.

    Finally pushed devi to github. Tool to devirtualize virtual function calls using and IDA Pro.

    Poništi
  4. proslijedio/la je Tweet
    12. ožu 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    If is running, I do the recording from the drone! 🤣

    Poništi
  5. proslijedio/la je Tweet
    20. velj 2019.
    Poništi
  6. 18. velj 2019.

    Had a great time at . Had the pleasure to attend the fuzzing and triaging traing from . After that I met many nice people like and . Would definitely go again! Now looking forward for in 4 weeks.

    Poništi
  7. proslijedio/la je Tweet
    12. velj 2019.

    Microsoft addresses a remote code execution vulnerability (CVE-2019-0728) I found in in version 1.31.1. Update your Visual Studio Code now ;-)

    Poništi
  8. 10. velj 2019.

    On my way to really excited for the next week!

    Poništi
  9. proslijedio/la je Tweet

    We are excited to announce the PHP Security Advent Calendar 2018! Find out what daily surprises are waiting for you this year:

    Poništi
  10. proslijedio/la je Tweet
    17. stu 2018.

    We just posted our first write-up from for the Vending service:

    Poništi
  11. 14. stu 2018.

    Blog post about vulnerabilities and I found in Nexus Repository Manager

    Poništi
  12. proslijedio/la je Tweet
    24. lis 2018.

    Registration is open. You're welcome to join our vault! Remind you, 2018 will be held on November 10th.

    Poništi
  13. proslijedio/la je Tweet
    12. lis 2018.

    New blog post: Multiple Vulnerabilities in UNIFY OpenScape Desk Phone CP600

    Poništi
  14. proslijedio/la je Tweet
    16. tra 2018.

    Today I published the code of my old attack-defense CTF framework we (Kernel Space Invaders) used for 2015/2016. It may not be perfect, but it probably helps some CTF newbies to get some ideas. 💩🙂

    Poništi
  15. proslijedio/la je Tweet
    4. tra 2018.

    My latest blog post is out today! Read on to learn how to combine 's Medium Level IL and Z3 to find bugs

    Poništi
  16. proslijedio/la je Tweet
    19. ožu 2018.

    I've published the slides we used last week for the ARM exploitation training

    Poništi
  17. proslijedio/la je Tweet
    19. sij 2018.

    My Exploit Development class is now a pirate course, running without official recognition, so the entire course is freely available to everyone.

    Poništi
  18. proslijedio/la je Tweet
    19. sij 2018.

    If you'd like to fuzz some TCP servers (Apache httpd, ISC Bind, OpenSSH), here're some quick thoughts on that:

    Poništi
  19. proslijedio/la je Tweet
    5. sij 2018.

    *drumroll* The next picoCTF will take place in fall 2018! Exact dates & details will be announced over the next few months. 😎

    picoCTF: Fall 2018
    Poništi
  20. proslijedio/la je Tweet

    We want to proudly announce that this year's C3 CTF will have a less hardcore "Junior version" for beginners, people with little time to spare during the C3, and people who want to get into new challenge categories. Tell your friends at C3!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·