Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @_r1fl
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_r1fl
-
r1fl proslijedio/la je Tweet
I just found out someone assigned a CVE to
#checkm8. This is my first CVE ever!
CVE-2019-8900
Apple devices vulnerable to arbitrary code execution in SecureROMhttps://www.kb.cert.org/vuls/id/941987/ Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
┏━━┓┏━━┓┏━━┓┏━━┓ ┗━┓┃┃┏┓┃┗━┓┃┃┏┓┃ ┏━┛┃┃┃┃┃┏━┛┃┃┃┃┃ PYTHON 2 IS NOW DEPRECATED GOOD LUCK & HAPPY NEW YEAR ┃┏━┛┃┃┃┃┃┏━┛┃┃┃┃ ┃┗━┓┃┗┛┃┃┗━┓┃┗┛┃ ┗━━┛┗━━┛┗━━┛┗━━┛
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
36c3 was one hell of a way to end the decade
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
v2 of my free Intro to Android App Reverse Engineering workshop is here!
I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!
http://maddiestone.github.io/AndroidAppRE pic.twitter.com/0iPNoJ3p7y
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
The KAF team is proud to announce that our first CTF competition is launching soon. We'd be glad if you signed up and played on https://kaf.sh pic.twitter.com/zSz9KhMaYz
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
Save the date next meeting Tuesday 26 of November. I’ll post the agenda soon.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
r1fl proslijedio/la je Tweet
A history lesson for people who think that history doesn't matter: The standard SecureROM code is based on the DFU spec written in 2004, which is based on the USB spec written in 1996, which is based on chariot races conditioned by the Roman empire. Pictured: preparing for race.pic.twitter.com/JBNle9rVyJ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
@axi0mX’s#checkm8 is out and let’s you debug your device (up to A11). But how is this done? Here is a little thread on dumping the bootrom (SecureROM) on demoted devices with Apple’s official tools. 1/ connect the cable using the correct lighting orientation and launch astrispic.twitter.com/00FSJHJVup
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
Reminder - http://dc9723.org meeting this Tuesday. Please RT
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
We too have been working on
#MaximumSecurity , register to play#DC27quals next week! https://register.oooverflow.io/#/ cc/@defconHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
Acclaimed
#security researcher@trufae (aka "pancake") keynoting@ArkC0n 2019, presenting innovations in#reverseengineering with#Radare2#whitehat#hacking#threatresearch#reverseengineering#ArkConpic.twitter.com/OBq3W6s4tk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
Collect your arcade coins, we are getting closer ! 24.06.19, Monday, TAU university, BAR-SHIRA,
@ICRCTau cyber week#bsides#bsidestlv#cyberweekpic.twitter.com/XxaIVgO3jm
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
This is the interface of GHIDRA, the NSA's Reverse Engineering tool as shown in a presentation (~2011) leaked by
@Snowden. The icon of a dragon fits perfectly the tool's name ;)@rsesek was the first to spot, good catch! Leaked slides - "4th Party IPT": https://search.edwardsnowden.com/docs/FourthPartyOpportunities2015-01-17_nsadocs_snowden_doc …pic.twitter.com/HouuqvhQYK
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
Published the slides & exploit for my
#35C3 talk, enjoy :)https://github.com/j0nathanj/Publications/tree/master/35C3_From_Zero_to_Zero_Day …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
Chrome 69 stable full chain exploit demo: This is how we presented the sandbox escape this morning at Hack2Win. Thanks to
@_niklasb for his huge help with exploit dev,@5aelo for providing a super reliable RCE, and @bevxcon for hosting this event!pic.twitter.com/tQOb1UVCadHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
1985: The hacker zine Phrack was first published.pic.twitter.com/IJVZnQG72n
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
Tips to really Master Something 1. Move away from basics as quickly as possible 2. Constantly expose yourself to stuff you don't understand and later revisit what you thought you understood (but actually didn't) 3. Do cross-disciplinary research to develop a deeper understandinghttps://twitter.com/brutelogic/status/988450601527857154 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r1fl proslijedio/la je Tweet
Really cool
#vulnerability/exploit search engine, using multiple source feeds https://sploitus.com
#exploitdb#pentest#redteampic.twitter.com/e0WulPkV2w
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.