Aaron Imperial

@blackleitus

like to break things | Penetration Tester | Exploit Development | Vulnerability Researcher | offsec

Vrijeme pridruživanja: srpanj 2017.

Tweetovi

Blokirali ste korisnika/cu @blackleitus

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @blackleitus

  1. Prikvačeni tweet
    26. ruj 2019.

    hey guys, I want to join into browser exploitation, but I always spin in the same topic because I don't know how to move deeper (browser exploitation). any ideas/strategy for reversing js engines / fuzzing ?

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  3. 1. velj
    Poništi
  4. 31. sij
    Poništi
  5. 30. sij

    dropping 0days knowledge. The Windows Research Kernel (WRK)

    Poništi
  6. 29. sij

    How to use the Fuzz tool WinAFL—fuzzing the FreeImage image analysis library #

    Poništi
  7. proslijedio/la je Tweet
    28. tra 2019.

    A closer (beginners) look at CVE-2019–0539 by Benoit Sevens

    Poništi
  8. proslijedio/la je Tweet
    5. svi 2019.

    Nice writeup+(0x41414141) PoC for Mozilla Firefox HTML5 Stream Parsing Use-after-free Vulnerability (CVE-2018-18500) by Yaniv Frank from :

    Poništi
  9. proslijedio/la je Tweet
    17. pro 2019.
    Prikaži ovu nit
    Poništi
  10. 19. sij

    iOS 13.3 / 13.2 / 13 A12 / A13 JAILBREAK: New Kernel Exploit RELEASED! (Explained) (For All devices)

    Poništi
  11. 16. sij
    Poništi
  12. proslijedio/la je Tweet
    Poništi
  13. proslijedio/la je Tweet
    8. sij

    Iranian Threat Actors, TTPs, and how to emulate! Thanks to APT33 APT34 APT39 Charming Kitten CopyKittens Group5 Leafminer Magic Hound MuddyWater OilRig

    Poništi
  14. 8. sij

    you will need to solve your challenges whatever way, no matter how you solve it. try SMART and not HARDER #

    Poništi
  15. 31. pro 2019.

    retaking some time to fix as soon as possible our post-exploitation tool to release it. it can detect reserved connection from our blue team friends

    Poništi
  16. 21. pro 2019.

    A method to bypass a null byte in a POP-POP-RETN address for exploiting local SEH overflows via DLL injection

    Poništi
  17. proslijedio/la je Tweet
    13. pro 2019.

    libFuzzer fuzzing SQLite in the browser using WebAssembly:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    12. pro 2019.

    Learn how to exploit Symantec Endpoint Protection on all versions of Windows (CVE-2019-12750). Part 2 of this series by delves into a more advanced method of exploitation!

    Poništi
  19. 11. pro 2019.

    debe entender si alguien dice "NO" es NO, y debe respetar su respuesta. hoy recibí una tarjeta tuya "Tarjeta Vive BBVA", y realmente no quiero usarla en absoluto, entonces, ¿hay alguna forma de cancelar AHORA MISMO, HOY y no en un futuro posterior?

    Poništi
  20. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  21. proslijedio/la je Tweet
    9. pro 2019.

    We open sourced PathAuditor: a tool for Linux that and I worked on this summer. Tl;dr: you can use it to instrument root daemons and find insecure file access patterns like CVE-2019-3461. Check out the code: Blog post:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·