Tweetovi

Blokirali ste korisnika/cu @atiflody

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @atiflody

  1. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  2. 31. pro 2019.

    新年好!!!!

    Poništi
  3. 19. pro 2019.
    Poništi
  4. proslijedio/la je Tweet
    13. lis 2019.

    I have pushed all my HITCON CTF 2019 Quals *Web Challenge* writeups into GitHub!

    Poništi
  5. 12. svi 2019.

    Whats wrong with shellql

    Poništi
  6. proslijedio/la je Tweet
    16. tra 2019.

    Speaker Highlight: Marco Grassi () & Liang Chen () will be presenting ‘2PAC 2Furious: Envisioning a iOS compromise in 2019.

    Poništi
  7. proslijedio/la je Tweet
    25. ožu 2019.

    much more teams solved zer0des than I expected. isn't it at least harder than zer0c4 last year?

    Poništi
  8. proslijedio/la je Tweet
    25. ožu 2019.

    challenge/solution scripts for 0ctf/tctf 2019 quals if you need (babysponge, zer0mi, zer0des, If on a winters night a traveler)

    Prikaži ovu nit
    Poništi
  9. 22. ožu 2019.

    A huge thank to It's my first time to do real world thing. Feel super happy to cooperate with Manuel.

    Poništi
  10. 13. velj 2019.
    Poništi
  11. proslijedio/la je Tweet
    22. sij 2019.

    Here is the PoC of the bug I used to jailbreak can work before 12.1.2..The blog post about exploit on A12 will come soon.😀

    Poništi
  12. proslijedio/la je Tweet
    6. sij 2019.

    The Chrome 69 exploit I wrote with and is public now. Check out that CTF quality! lolz

    Poništi
  13. 3. sij 2019.

    Is there anyway to catch the iframe sandbox escape error?

    Poništi
  14. 2. sij 2019.
    Poništi
  15. proslijedio/la je Tweet
    13. pro 2018.
    Poništi
  16. proslijedio/la je Tweet
    6. stu 2018.
    Poništi
  17. 9. lis 2018.

    cve-2018-17456, I successfully inject the arguments in the url parameter, but because the url parameter has been used to construct the payload and I can't use space, so I can't inject the original url after the injected parameter, the "git clone" process always failed, :(

    Poništi
  18. proslijedio/la je Tweet
    8. lis 2018.

    The new git vuln (CVE-2018-17456) is great, nice find !

    CVE-2018-17456 exploit
    Poništi
  19. proslijedio/la je Tweet
    12. ruj 2018.

    A huge thank to It's my first time to do real world thing. Feel super happy to cooperate with Marco.

    Poništi
  20. proslijedio/la je Tweet
    18. kol 2018.

    For DEF CON 2018, we built a bit of assembly code that prints out shellcode in 8 different architectures: AMD64, Clemency, PDP-1, LGP-30, and several others. Check out how we did it:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·