antic0de

@antic0de

Network Intrusion Specialist

Vrijeme pridruživanja: listopad 2008.

Tweetovi

Blokirali ste korisnika/cu @antic0de

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @antic0de

  1. proslijedio/la je Tweet
    1. velj

    The team is working through submissions for the first round of 2020 hiring for junior and senior roles. Be quick to get in there if you’re new to the industry or just looking for a change from the norm.

    Poništi
  2. 1. velj

    The team is working through submissions for the first round of 2020 hiring for junior and senior roles. Be quick to get in there if you’re new to the industry or just looking for a change from the norm.

    Poništi
  3. proslijedio/la je Tweet
    31. sij
    Odgovor korisniku/ci

    is hiring.... Come hack the planet with us!

    Poništi
  4. proslijedio/la je Tweet
    30. sij
    Poništi
  5. proslijedio/la je Tweet
    30. sij

    We are looking for security people at Okta. Remote OK for most EU/US cities. It's awesome. Ping me!

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    New paper: “LoRaWAN Networks Susceptible to Hacking: Common Cyber Security Problems, How to Detect and Prevent Them”

    Poništi
  7. proslijedio/la je Tweet
    28. sij

    "Discovery and exploitation of Windows host-based vulnerabilities" - by

    Poništi
  8. proslijedio/la je Tweet
    26. sij

    Windows / Linux Local Privilege Escalation Workshop (Materials included !) 🥳

    Poništi
  9. proslijedio/la je Tweet
    26. sij

    Come join me and for “Linux Heap Exploitation” - a 4-day training at Singapore

    Poništi
  10. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    22. sij

    TIL 7-zip can mount a VMDK.

    Poništi
  12. proslijedio/la je Tweet
    22. sij

    Has anyone managed to dump the T2 chip firmware from apple macbook so far? (not asking for actual dump just asking whether this was done before) (cc: )

    Poništi
  13. proslijedio/la je Tweet
    21. sij

    Here's your chance to hear tell the story of MS08-067 and finding exploits in crash reports :) And in case you missed the blog post he published a while ago:

    Poništi
  14. proslijedio/la je Tweet
    21. sij

    If you're going to The Things Conference in Amsterdam, be sure to catch Cesar Cerrudo, CTO at IOActive, and his keynote session "LoRaWAN Networks Susceptible to Hacking: Common Cyber Security Problems and How to Detect Them" on January 30th.

    Poništi
  15. proslijedio/la je Tweet
    15. sij
    Poništi
  16. proslijedio/la je Tweet
    15. sij

    Do Stack Buffer Overflow Good has been updated with notes on Python 3. Learn yourself some basic stack smashing goodness on Windows!

    Poništi
  17. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  18. proslijedio/la je Tweet
    12. sij

    Safestack's first blog post of the year! Help your security penetration testers escape Groundhog Day by getting deeper insights from their reports:

    Poništi
  19. proslijedio/la je Tweet
    10. sij

    bringing my stencil game to the in

    Poništi
  20. proslijedio/la je Tweet
    9. sij

    SHACK aka WhiskeyCon Training Classes. Check out and sign up fast

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·