Tweetovi

Blokirali ste korisnika/cu @bitshifter123

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bitshifter123

  1. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  2. proslijedio/la je Tweet

    Day 2 of our Top 5 bugs for 2019 is an LPE in win32k.sys through indexed color palettes. The deep and thorough analysis is provided by Marcin Wiązowski, who reported the bug.

    Poništi
  3. proslijedio/la je Tweet
    25. stu 2019.

    What? A library that wraps IDA decompiler API and makes it usable? *and* documented? We just released a thing. Blog: Github: Docs!!!:

    Poništi
  4. proslijedio/la je Tweet

    I'm publishing some 🔥 research today, a major design flaw in Windows that's existed for almost *two decades*. I wrote a blog post on the story of the discovery all the way through to exploitation.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    8. srp 2019.
    Poništi
  6. proslijedio/la je Tweet

    Am I the first person to pop a shell in notepad? 🤣 ....believe it or not, It's a real bug! 🐞

    Poništi
  7. proslijedio/la je Tweet
    26. svi 2019.

    I wrote a thing about my macOS sandbox escape & LPE from Pwn2Own

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    16. svi 2019.

    New blog post written together with my friend about using the JIT to abuse a non-JIT bug in Chakra (CVE-2019-0812)

    Poništi
  9. proslijedio/la je Tweet

    We've confirmed exploitability of Windows Pre-Auth RDP bug (CVE-2019-0708) patched yesterday by Microsoft. Exploit works remotely, without authentication, and provides SYSTEM privileges on Windows Srv 2008, Win 7, Win 2003, XP. Enabling NLA mitigates the bug. Patch now or GFY!

    Poništi
  10. proslijedio/la je Tweet
    10. svi 2019.

    Project Zero guest blog: "Trashing the Flow of Data" by Stephen Röttger () -

    Poništi
  11. proslijedio/la je Tweet
    9. svi 2019.
    Poništi
  12. proslijedio/la je Tweet
    7. svi 2019.
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    29. sij 2019.

    Here is my exploit for one of 's TurboFan bugs related to an incorrect typing of String.(last)IndexOf JSCall nodes.

    Poništi
  14. proslijedio/la je Tweet
    16. sij 2019.

    New Year, New Blog. I've updated my blog theme for the first time in 12 years and kicking things off with a multi-part post on Hyper-V Fuzzing. To start, we begin with a little tutorial on WDF driver development and how it greatly simplifies driver writing

    Poništi
  15. proslijedio/la je Tweet
    6. sij 2019.

    The Chrome 69 exploit I wrote with and is public now. Check out that CTF quality! lolz

    Poništi
  16. proslijedio/la je Tweet
    2. sij 2019.

    applepie: A hypervisor for Bochs. This will be a rapidly evolving project that currently is just a hypervisor but shortly will be an instrumentation and fuzzing framework. I've got like 8 Word 0-day from falkervisor I'll refind with this and blog about :D

    Poništi
  17. proslijedio/la je Tweet

    In the last of the top 5 bugs of 2018, details a fascinating bug that led to the feature being removed entirely to address it.

    Poništi
  18. proslijedio/la je Tweet
    18. pro 2018.

    Windows Sandbox > a new lightweight desktop environment tailored for safely running applications in isolation

    Poništi
  19. proslijedio/la je Tweet

    Whack-a-mole Security™ - when root cause analysis really ain't your thing

    Poništi
  20. 6. pro 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·