Arun Manoharan

@b14ckh34rt

Security Enthusiast | Exploit Development | Pentesting | Python | CTF | Gamer

Mumbai, India
Vrijeme pridruživanja: lipanj 2016.

Tweetovi

Blokirali ste korisnika/cu @b14ckh34rt

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @b14ckh34rt

  1. proslijedio/la je Tweet
    30. sij

    Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!

    Poništi
  2. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    28. sij

    Interested about our Reverse Engineering technologies ? Here are our next training sessions: 📆10 - 12 February (in our lab) 📆20 - 21 April (HiTB, Amsterdam, The Netherlands)

    Poništi
  4. proslijedio/la je Tweet
    14. sij

    If anyone wants to use unicorn afl with good ol' C, here's how to do it

    Poništi
  5. proslijedio/la je Tweet
    24. sij

    Cross-Site Websocket Hijacking bug in Facebook that leads to account takeover By Bounty: $12500

    Poništi
  6. proslijedio/la je Tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi
  7. proslijedio/la je Tweet
    27. sij

    Great talk from AMS 2019 on new attack vectors on *OS, deserves more than just 100 views

    Poništi
  8. proslijedio/la je Tweet
    22. sij

    Learn to write your first OS kernel (minimalist kernel) : Kernels 101 – Let’s write a Kernel : cc

    Poništi
  9. proslijedio/la je Tweet
    22. sij

    Hello world from a bootloader - writing a simple bootloader in 16-bit assembly that uses BIOS interrupts to print text to the screen : cc

    Poništi
  10. proslijedio/la je Tweet
    22. sij
    Poništi
  11. proslijedio/la je Tweet
    24. sij

    TLDR pages : Simplified, community-driven man pages w/ examples : -->to quickly get access to community-driven cheat sheets. It has more than 60 programming languages and UNIX/Linux commands :

    Poništi
  12. proslijedio/la je Tweet
    24. sij
    Poništi
  13. proslijedio/la je Tweet
    24. sij

    Hypervisor From Scratch – Part 7 : Using EPT & Page-Level Monitoring Features : 6: Virtualizing An Already Running System : 5: Setting up VMCS & Running Guest Code : cc

    Poništi
  14. proslijedio/la je Tweet
    24. sij

    hwsec_lecture_notes : Lecture notes for the Hardware and Embedded Systems Security lecture : cc

    Poništi
  15. proslijedio/la je Tweet
    9. sij
    Poništi
  16. proslijedio/la je Tweet
    2. sij
    Poništi
  17. proslijedio/la je Tweet
    30. pro 2019.

    I would like to thank , and for consuming all of my time on the Player2 machine this holiday break. Holy hell I learned quite a bit, thanks!

    Poništi
  18. proslijedio/la je Tweet
    25. pro 2019.

    Ghostphisher just owned root on PlayerTwo ! via A great box which I had completed. Thanks & for creating this box.

    Poništi
  19. proslijedio/la je Tweet
    24. pro 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·