Tweetovi

Blokirali ste korisnika/cu @_nullsector_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_nullsector_

  1. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers, and show that high speed DMA attacks can bypass hardware protections on enterprise devices.

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    I found this article to be excellent. From building Windbg Tooling to working exploits. Its a dense and rich read. Really well done. I thought. Introduction to SpiderMonkey exploitation.

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    hax bucket-list item checked tonight: reverse-engineered a patch > recreated an undisclosed exploit > popped a production server with it. \o/

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    28. sij

    “Tell me again, what instrument do you play?”

    Poništi
  6. 30. sij

    New business idea. Cyber psychic and paranormal investigation service. Is your datacenter possessed by a lesser demon or poltergeist? Find out with a consultation. Operators are standing by. 👻👻👻👻

    Poništi
  7. 24. sij
    Poništi
  8. proslijedio/la je Tweet
    22. sij

    How many Pwn2Own Master of Pwn points did MBS get for hacking Bezos? -

    Poništi
  9. proslijedio/la je Tweet
    18. sij

    Windows kernel explorer: A free powerful Windows kernel research tool

    Poništi
  10. proslijedio/la je Tweet
    16. sij

    Zelda OOT speedruns in 2020: "yeah we just manipulate the heap by lifting rocks to exploit a use-after-free and rewrite a function pointer to jump into a multi stage payload involving Link's name and the buttons pressed on controllers 1 and 3"

    Poništi
  11. proslijedio/la je Tweet
    15. sij

    Assert yourself on the browser playground with ’s guide to hunting Chrome IPC sandbox escapes:

    Poništi
  12. proslijedio/la je Tweet
    9. sij

    Thread: how to break into any organization’s environment using the latest red team methodology...

    Prikaži ovu nit
    Poništi
  13. 13. sij

    “If we will be quiet and ready enough, we shall find compensation in every disappointment.” ― Henry David Thoreau

    Poništi
  14. proslijedio/la je Tweet
    11. sij

    1. Never stop learning. 2. See failure as a beginning. 3. Teach others what you know. 4. Assume nothing, question everything. 5. Analyze objectively. 6. Practice humility. 7. Respect constructive criticism. 8. Love what you do. 9. Give credit where it's due. 10. Take initiative.

    Poništi
  15. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  16. proslijedio/la je Tweet
    9. sij

    Remember that nation states don't start hacking during moments of instability or crisis. They've been compromising systems and putting implants in place for years. You cannot just look at the parameter. You need to look in your network for existing footholds - yesterday.

    Poništi
  17. proslijedio/la je Tweet
    16. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    9. pro 2019.
    Poništi
  19. 23. stu 2019.

    Received my prize today. Really digging the aesthetic. Thanks to and . Till next year.

    Poništi
  20. proslijedio/la je Tweet
    21. stu 2019.

    For every word cyber added, there is an exploit waiting to be born.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·