Tweetovi

Blokirali ste korisnika/cu @alexeyst

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @alexeyst

  1. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  2. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  3. proslijedio/la je Tweet
    20. pro 2019.

    JavaScript fuzzing with libFuzzer

    Poništi
  4. proslijedio/la je Tweet
    13. pro 2019.

    I wrote a thing about JSC exploitation (including how to leak StructureID) and Safari sandbox escape.

    Poništi
  5. 15. lis 2019.

    Running on such a massive portion of the internet, with millions of page views at any time, enables unique perspectives on JS malware research

    Prikaži ovu nit
    Poništi
  6. 15. lis 2019.

    We still run untrusted JS, on a massive scale, everywhere, in first-party contexts, on a massive scale, and the current all-or-nothing approaches are not enough to control it. There is a better way

    Prikaži ovu nit
    Poništi
  7. 15. lis 2019.

    Browsers don't offer granular control of what 3rd party JS can do, sandboxes don't work. We're solving that in fighting JS malware across millions of devices in real-time @ , and are looking for malware researchers and browser security people. DMs are open

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet

    visual studio code: remote debugger enabled by default

    Poništi
  9. proslijedio/la je Tweet
    10. lis 2019.

    If you ever tried to perform XSS without parenthesis, you may have realized that eval`payload` does not work. However you can do this instead: Function`alert\`xss\````

    Poništi
  10. proslijedio/la je Tweet
    27. kol 2019.

    Revealing AWS S3 bucket name: step 1: Find any CDN object URL step 2: append following string to after URL: `?AWSAccessKeyId=[Valid_ACCESS_KEY_ID]&Expires=1766972005&Signature=ccc ` and boom it will reveal the bucket name.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    9. kol 2019.

    In case you missed 's talk at this week, here is a video showing a remote exploit for one of the iMessage bugs we found: Be sure to read if you are interested in these kinds of attacks!

    Poništi
  12. proslijedio/la je Tweet
    21. srp 2019.

    GitGot : Rapidly search for leaked secrets across GitHub : cc

    Poništi
  13. proslijedio/la je Tweet

    Wait, WHAT? Americans, can you confirm?

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    24. lip 2019.

    To whoever set up this hotspot next to our office: NICE TRY! 😂

    Poništi
  15. proslijedio/la je Tweet
    25. lip 2019.

    Happy 18th birthday to Safari and WebKit!!! 🎂🎂🎂 Yes, June 25 is the day. Also, happy birthday to ! 🎉

    Poništi
  16. proslijedio/la je Tweet
    4. lip 2019.

    if you see us at OpsNy say hi! we hope you enjoyed the panel with our great friends from

    Poništi
  17. proslijedio/la je Tweet

    No info leak, no ROP, no shellcode? No problem! describes his no shellcode exploit of a write-what-where vulnerability in . Details at

    Poništi
  18. proslijedio/la je Tweet
    26. svi 2019.

    We are going to try out 's exploit, setup a vulnerable WebKit version and learn how we can explore the internals and debug JSC.

    Poništi
  19. proslijedio/la je Tweet
    17. svi 2019.

    Search through private and public attachements of . Having a direct link, you can read the document site:

    Poništi
  20. proslijedio/la je Tweet
    21. svi 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·