Adrien Guinet

@adriengnt

Security researcher . LLVM, C++, binary analysis and cryptography with 🧐

France
Vrijeme pridruživanja: siječanj 2014.

Tweetovi

Blokirali ste korisnika/cu @adriengnt

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @adriengnt

  1. proslijedio/la je Tweet
    2. velj

    I’ve just uploaded my Jailbreak for the iPad Pro (2017) to GitHub. Right now, SSH and Sileo can be installed. Due to lack of devices, I cannot currently implement support for other devices. Feel free to create PRs if you would like to help me!

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Emulator bug? No, LLVM bug - a "story" on how revealed an obscure bug in runtime dynamic linker.

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Every Yaml parser is a custom Yaml parser. 😱

    Poništi
  4. proslijedio/la je Tweet

    Please note: By recklessly publishing low-quality information about the outbreak, has risen from a handful of twitter followers to over 75,000 in a matter of days.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    1. velj

    It's not every day that a read-after-write makes a server spend 4% of its CPU cycles in one instruction. Wrote that one up here:

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    Vous avez jusqu'à dimanche, 23h59 heure de Paris pour soumettre à SSTIC 2020, dépêchez vous !

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    Wanna learn some RF Hacking with Software-Defined Radio in a romantic city like Paris? We are also doing a 3-day session at this year! Click here for more details:

    Poništi
  8. proslijedio/la je Tweet
    24. sij
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    29. sij

    "Ever suspect the Facebook app is listening to you? What we now know is even creepier." — Here's some good news, though: if you're using Firefox + Facebook Container, they probably know a lot less about what you do online than they could.

    Poništi
  10. proslijedio/la je Tweet
    28. sij

    Wow. Wow. Wow. Reading through the criminal complaint against nanotechnology researcher Charles Lieber at Harvard (courtsey of ). This is nuts. Lieber was offered $50,000 a month and $150K+ for collaborating with Wuhan University of Technology.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    26. sij

    If you want to hear another story about how , and are defrauding us restaurants and their customers, pull up a chair. I have a story to tell.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    23. sij

    Sharing a new demo + an article on BlueKeep dissection (CVE-2019-0708) using REVEN. See how data Tainting, Memory History, and its Python API streamline the RE process to quickly and accurately analyze the root-cause and behavior at the system level.

    Poništi
  13. proslijedio/la je Tweet
    21. sij

    👉🏼Chez , c’est « No asshole policy » mais c’est recommandé de lécher celui du patron 🙌🏽🤣

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    22. sij

    Yesterday I learned (YIL?) that even if a type is standard layout, and trivially copyable, it is not always safe, even in practice, to use it a destination for std::memcpy or to zero it with std::memset. That is, the following is not safe:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    20. sij

    someone should introduce poor John to the concept of threat model

    Poništi
  16. proslijedio/la je Tweet
    20. sij

    The slides of (great) presentation at RWC about HSM security are now online

    Poništi
  17. 20. sij

    Y2038 bug is already there. Thread to read!

    Poništi
  18. proslijedio/la je Tweet
    18. sij

    Two last days to buy your early bird ticket and use the coupon "TWITTER" for an extra %10 off ⏳

    Poništi
  19. proslijedio/la je Tweet
    16. sij

    We just moved Project Verona into the open on Github to facilitate academic collaborations in language research.

    Poništi
  20. proslijedio/la je Tweet
    16. sij

    Zelda OOT speedruns in 2020: "yeah we just manipulate the heap by lifting rocks to exploit a use-after-free and rewrite a function pointer to jump into a multi stage payload involving Link's name and the buttons pressed on controllers 1 and 3"

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·