Azeria Labs

@azeria_labs

Courses designed to last | Training courses on ARM Exploit Development, Reverse Engineering, Vulnerability Research | Free Tutorials

Vrijeme pridruživanja: siječanj 2018.

Tweetovi

Blokirali ste korisnika/cu @azeria_labs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @azeria_labs

  1. proslijedio/la je Tweet
    28. stu 2019.

    “It is disappointing to see Apple use their power to try and destroy a start-up with so much potential” – Maria Markstedter, founder of , weighs in on the Apple-Corellium lawsuit

    Poništi
  2. proslijedio/la je Tweet

    Yo! New blog post: ROP on ARM with radare2 - with an exploitation challenge provided by / and a remote debugging setup:

    Poništi
  3. proslijedio/la je Tweet
    31. lis 2019.

    I’m thrilled to announce that I’ll be giving my 4-day IoT Exploit Development course at next year! 🤩 First time I teach it publicly and it will likely be my only public 4-day training next year (usually only taught for private trainings).

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    5. stu 2019.

    Review Board members , & share their predictions for 2020. These topics and more to be highlighted at Black Hat Europe 2019, Dec. 2-5

    Poništi
  5. proslijedio/la je Tweet
    10. lis 2019.

    The ARM 32-bit Exploitation and Defense workshop by at today was AMAZING! I am so glad I had the opportunity to attend! Thank you!!!

    Poništi
  6. proslijedio/la je Tweet
    12. ruj 2019.

    A few years old now but still a great read on the campaign lifecycle of an APT with real world examples. by and . And unrelated but awesome essays on learning as well - and

    Poništi
  7. 5. ruj 2019.

    iOS Heap Exploit Development - Case Study from an in-the-wild 0-Day Part 1: The iOS Exploit Strategy Part 2: Heap Overflow and the iOS Kernel Heap

    Poništi
  8. proslijedio/la je Tweet
    5. ruj 2019.

    Part 2 is live!✨ Heap Overflows and the iOS Kernel Heap - Case Study from an in-the-wild iOS 0-Day. Learn how the exploit developer used a clever vulnerability-conversion to turn a heap-overflow into an artificial Use-After-Free.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    3. ruj 2019.

    I’ve decided to write up one of the iOS exploits in a new series, walking through each step of the underlying exploit development process. Hope these post will be more accessible for ppl trying to learn exploit dev and understand how exploit devs think.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    16. kol 2019.

    NX bypass, writing assembly, building ROP chains, infoleaks, ASLR bypasses, stack canary bypass, Use-after-free, linear heap overflows, heap grooms, heap exploit primitives and more: in 4 days. And everyone did amazing job finishing the challenges! \o/

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    16. kol 2019.

    After months of effort developing a training course, one of the best feelings as a trainer is receiving heartwarming feedback like this. ♥️

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    14. kol 2019.

    Day 3 of my private training. Pretty impressed with the catering service I picked 😋

    Poništi
  13. proslijedio/la je Tweet
    6. kol 2019.

    Finished two excellent classes at Blackhat! is a great teacher, and after her class and 's hardware hacking courseware, I'm eager to do naughty things to little ARM doodles and bugs.

    Poništi
  14. proslijedio/la je Tweet
    6. kol 2019.

    BH trainings over! Great to be able to assist with her ARM exploitation class again. Looking forward to watching some cool iOS talks at the main conference the rest of this week! – mjesto: Mandalay Bay Events Center

    Poništi
  15. proslijedio/la je Tweet
    23. srp 2019.

    This!! Every bit of this!! Thank you and for teaching us how to become masters of any skill we put our keyboards to!

    Poništi
  16. 22. srp 2019.
    Poništi
  17. proslijedio/la je Tweet
    21. srp 2019.

    If you want to expand your knowledge of ARM processors or how to attacks devices running them, you won't find a better teacher than . Her materials & exercises are always detailed & well-thought out to make sure you get the most applicable skills.

    Poništi
  18. proslijedio/la je Tweet
    21. srp 2019.

    I see most of you are visiting the website from mobile. It looks much better on desktop tho 😋

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    20. srp 2019.

    ✨Big Announcement✨ After almost one year of building, preparing, and operating successfully but quietly, I am proud to finally tell you that I am ... Launching my new company! I promised a training page with weird design attempts so here it is:

    Prikaži ovu nit
    Poništi
  20. 20. srp 2019.

    We are excited to announce that our new company website officially launched today! 🎉 Azeria Labs will continue to provide free tutorials and aims to use part of its profits to organize free training bootcamps for students!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·