Ezra Caltum

@aCaltum

Researcher and Curious Hacker. My tweets are my own, they don't reflect views of my employeer

Tel Aviv
Vrijeme pridruživanja: srpanj 2009.

Tweetovi

Blokirali ste korisnika/cu @aCaltum

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @aCaltum

  1. 5. velj
    Poništi
  2. 5. velj
    Poništi
  3. proslijedio/la je Tweet
    5. velj

    Want to learn how to research machine learning security? Check out t2’18 presentation by and

    Poništi
  4. 28. sij

    It feels strange not to be at the meeting hearing talk. However - I’m happy that I have great support from the staff that can manage the meetup without me.

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    My comments about the hubbub of AV vuln use finally being caught: Everybody with any experience knew it's going on. AV software was vuln-dev training material more than a decade ago. There were just sufficient economic reasons to ignore it until it became indisputable.

    Poništi
  6. proslijedio/la je Tweet
    22. sij

    agenda for January 28 has been posted.

    Poništi
  7. proslijedio/la je Tweet
    16. sij
    Odgovor korisnicima

    😂🤣😂🤣 Hi, I’m mickey. That file is my fault... 🤷‍♂️😂

    Poništi
  8. proslijedio/la je Tweet
    14. sij

    Authored a piece on threat models! While often associated with early stages of software development, the process applies to firmware & hardware as well. Check out the benefits, five key steps, & 's real life EDK II threat model example:

    Poništi
  9. 31. pro 2019.

    Thanks for recommending “The Phoenix Project” it was an awesome book. It turns that I’m a “Brent” but had been working on improving that for quite some time.

    Poništi
  10. proslijedio/la je Tweet
    26. pro 2019.

    So, friends, I'm asking for your help. Back in 1991 or 1992, I published a write-up on the then-groundbreaking Haifa virus. It was a complete reverse engineering of the self-encrypting, self-modifying virus. I can't find a copy of that anywhere... [1/2]

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    24. pro 2019.

    This is the only thing I will say about so called offensive security tools: those that complain about such tools being freely available are the same that would like to keep them private or limitedly available under a subscription.

    Poništi
  12. proslijedio/la je Tweet
    17. pro 2019.

    Cya tonight at the meeting

    Poništi
  13. 15. pro 2019.

    Today I presented to my colleagues my hackiest hack in a long time. And they actually liked it very much :-)

    Poništi
  14. 10. pro 2019.

    “Dirty hacks, Dirty hacks Dirty all the way Oh, what fun is to hack In a one-thread open shell, hey”

    Poništi
  15. proslijedio/la je Tweet
    26. stu 2019.

    Is anyone selling tickets to 36C3? If so please lmk :)

    Poništi
  16. proslijedio/la je Tweet
    26. stu 2019.

    For anyone interested, the tool lives at There are also pre-generated type-stubs in the Releases page, if you wanna save yourself some time.

    Prikaži ovu nit
    Poništi
  17. 24. stu 2019.

    TIL... I’m an Okay (in phonetic Hebrew) writer myself. I wonder how offensive that is.

    Poništi
  18. 19. stu 2019.

    Does anybody from my feed have an extra CCC ticket?

    Poništi
  19. 17. stu 2019.

    Today in my morning commute to Haifa while going through security check. Security Guard: Do you work in Hi-Tech? Me: Yes Security Guard: Do you know somebody who is looking for an UI designer? Me: Unfortunately no, but good luck.

    Poništi
  20. proslijedio/la je Tweet
    17. stu 2019.

    Save the date next meeting Tuesday 26 of November. I’ll post the agenda soon.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·