Tweetovi

Blokirali ste korisnika/cu @blackzert

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @blackzert

  1. 23. ruj 2019.

    rewards Virtuailtor by Gal Zaban in plugin contest 2019, however its too hard to look at which made 9 months ago and has more features.

    Poništi
  2. proslijedio/la je Tweet
    25. lip 2019.
    Poništi
  3. proslijedio/la je Tweet
    10. ožu 2019.

    Thanks to ExpLife001, these articles & projects about Windows Kernel Security is really amazing.

    Poništi
  4. proslijedio/la je Tweet
    17. velj 2019.

    Here are the slides from my talk about my approach for JavaScript engine fuzzing: My master's thesis (for which I developed the fuzzer) can be found here: Thanks for the great conference ! =)

    Prikaži ovu nit
    Poništi
  5. 2. pro 2018.

    I've just push my changes to IDA plugin to a branch reconstructable_type. This now allows you to reverse C++ easier, enjoy!

    Poništi
  6. proslijedio/la je Tweet
    8. lis 2018.

    Hey! The slides for my tiny (and quite silly) project to fuzz Windows kernel code on Linux with AFL and QBDI are available here:

    Poništi
  7. proslijedio/la je Tweet
    30. ruj 2018.
    Poništi
  8. proslijedio/la je Tweet
    29. ruj 2018.

    The registration for Dragon CTF Teaser 2018 is OPEN! Have Fun, Good Luck!

    Poništi
  9. 14. ruj 2018.

    Linux kernel exploitation example for dummies

    Poništi
  10. proslijedio/la je Tweet
    27. kol 2018.

    Almost year has passed since we reported the INTEL-SA-00086 vulnarability and we have published JTAG activation PoC for Intel ME. You can use JTAG for researching ME core (via DbC debug cable). Step-by-step instructions at

    Poništi
  11. proslijedio/la je Tweet
    4. tra 2018.

    I've created a Linux Kernel Defence Map showing the relations between: - vulnerability classes / exploitation techniques, - kernel defences, - bug detection means. Feedback is welcome. Link:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet

    Interesting thing. An application ran by admin hasn't shadow against meltdown vulnerability.

    Poništi
  13. proslijedio/la je Tweet
    28. ožu 2018.
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    23. ožu 2018.

    Released an initial version of SDK for PulseDbg Who knows, might be useful for you ;)

    Poništi
  15. proslijedio/la je Tweet
    13. ožu 2018.

    New v2.1 [IDA7 Edition] released! Changelog: multiple bugfixes, added gcc Virtual Tables and RTTI parsing, improved Linux and macOS support.

    Poništi
  16. proslijedio/la je Tweet
    3. ožu 2018.

    Ah, yes, thanks for the announcement! No worries :) Soooo, STACKLEAK series, version 9: It was a long way since the moment you mentioned. Mainlining is hard. But it made me stronger.

    Poništi
  17. proslijedio/la je Tweet
    27. velj 2018.

    Found ICL (Ice Lake, Family 16 Model 126) 1-core U sample's performace info on geekbench:

    Prikaži ovu nit
    Poništi
  18. 22. velj 2018.
    Poništi
  19. proslijedio/la je Tweet
    20. velj 2018.

    Look, STACKLEAK blocks the recent CVE-2017-17712 exploit against : The uninitialized stack pointer is set to STACKLEAK_POISON (-0xBEEF). That blocks the stack spraying needed for a local privilege escalation.

    Poništi
  20. 18. velj 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·