bad_access

@access_bad

Aspiring Security Research interested in browser and android exploit development | Currently Accepting Job Offers

United States
Vrijeme pridruživanja: prosinac 2019.

Tweetovi

Blokirali ste korisnika/cu @access_bad

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @access_bad

  1. proslijedio/la je Tweet
    22. sij

    Finally uploaded video of my talk "Expanding the Reach of Fuzz Testing", which I gave at UMass Amherst! Introduces PerfFuzz, FuzzFactory, FairFuzz, Zest + JQF, RLCheck and Autopandas 😃

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    13. sij
    Poništi
  3. proslijedio/la je Tweet
    6. sij

    This year I’m teaming up with some amazing folks to create a new startup that will help people advance their skills and bring new people into the field. Former attendees and those who take my upcoming training will get free access to the platform before anyone else does.

    Prikaži ovu nit
    Poništi
  4. 2. sij

    Check out the write up for the exploit I wrote exploiting CVE-2019-8601, an integer overflow discovered by in Safari’s JavaScriptCore!

    Poništi
  5. 29. pro 2019.

    Exploited WebKit's JavaScriptCore to pop a calc on Linux! This vulnerability (CVE-2019-8601) was originally discovered and exploited by in pwn2own. Hope to have my write up out in the next few days!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·