r1fl

@_r1fl

i like memory corruptions and sushi

Israel
Vrijeme pridruživanja: ožujak 2016.

Tweetovi

Blokirali ste korisnika/cu @_r1fl

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_r1fl

  1. proslijedio/la je Tweet
    12. sij

    I just found out someone assigned a CVE to . This is my first CVE ever! 🔥 CVE-2019-8900 Apple devices vulnerable to arbitrary code execution in SecureROM

    Poništi
  2. proslijedio/la je Tweet
    1. sij

    ┏━━┓┏━━┓┏━━┓┏━━┓ ┗━┓┃┃┏┓┃┗━┓┃┃┏┓┃ ┏━┛┃┃┃┃┃┏━┛┃┃┃┃┃ PYTHON 2 IS NOW DEPRECATED GOOD LUCK & HAPPY NEW YEAR ┃┏━┛┃┃┃┃┃┏━┛┃┃┃┃ ┃┗━┓┃┗┛┃┃┗━┓┃┗┛┃ ┗━━┛┗━━┛┗━━┛┗━━┛

    Poništi
  3. proslijedio/la je Tweet
    31. pro 2019.

    36c3 was one hell of a way to end the decade

    Poništi
  4. proslijedio/la je Tweet
    5. pro 2019.

    🌟v2 of my free Intro to Android App Reverse Engineering workshop is here! 🌟 I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!

    Screenshot of the table of contents at maddiestone.github.io/AndroidAppRE
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    3. pro 2019.

    The KAF team is proud to announce that our first CTF competition is launching soon. We'd be glad if you signed up and played on

    Poništi
  6. proslijedio/la je Tweet
    17. stu 2019.

    Save the date next meeting Tuesday 26 of November. I’ll post the agenda soon.

    Poništi
  7. proslijedio/la je Tweet
    10. stu 2019.
    Poništi
  8. proslijedio/la je Tweet
    28. ruj 2019.

    A history lesson for people who think that history doesn't matter: The standard SecureROM code is based on the DFU spec written in 2004, which is based on the USB spec written in 1996, which is based on chariot races conditioned by the Roman empire. Pictured: preparing for race.

    Poništi
  9. proslijedio/la je Tweet
    28. ruj 2019.

    ’s is out and let’s you debug your device (up to A11). But how is this done? Here is a little thread on dumping the bootrom (SecureROM) on demoted devices with Apple’s official tools. 1/ connect the cable using the correct lighting orientation and launch astris

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    19. svi 2019.

    Reminder - meeting this Tuesday. Please RT

    Poništi
  11. proslijedio/la je Tweet
    4. svi 2019.

    We too have been working on , register to play next week! cc/

    Poništi
  12. proslijedio/la je Tweet
    30. tra 2019.

    Acclaimed researcher (aka "pancake") keynoting 2019, presenting innovations in with

    Poništi
  13. proslijedio/la je Tweet
    12. tra 2019.

    Collect your arcade coins, we are getting closer ! 24.06.19, Monday, TAU university, BAR-SHIRA, cyber week

    , , i još njih 4
    Poništi
  14. proslijedio/la je Tweet
    9. sij 2019.

    This is the interface of GHIDRA, the NSA's Reverse Engineering tool as shown in a presentation (~2011) leaked by . The icon of a dragon fits perfectly the tool's name ;) was the first to spot, good catch! Leaked slides - "4th Party IPT":

    Poništi
  15. proslijedio/la je Tweet
    10. sij 2019.
    Poništi
  16. proslijedio/la je Tweet
    21. ruj 2018.

    Chrome 69 stable full chain exploit demo: This is how we presented the sandbox escape this morning at Hack2Win. Thanks to for his huge help with exploit dev, for providing a super reliable RCE, and @bevxcon for hosting this event!

    Poništi
  17. proslijedio/la je Tweet
    17. stu 2018.

    1985: The hacker zine Phrack was first published.

    Poništi
  18. proslijedio/la je Tweet
    5. ruj 2018.

    Tips to really Master Something 1. Move away from basics as quickly as possible 2. Constantly expose yourself to stuff you don't understand and later revisit what you thought you understood (but actually didn't) 3. Do cross-disciplinary research to develop a deeper understanding

    Poništi
  19. proslijedio/la je Tweet
    11. ruj 2018.

    Really cool /exploit search engine, using multiple source feeds 👍

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·