Tweetovi

Blokirali ste korisnika/cu @brnocrist

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @brnocrist

  1. proslijedio/la je Tweet
    prije 5 sati
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    And here’s a wonderful post by OpenSMTPD’s main developer : Very interesting insight on how a bug enters the code and becomes exploitable over time.

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    Implemented a PoC for disabling kernel lockdown on Ubuntu via a keyboard emulated through USB/IP, CC

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    28. sij

    OS hacking: Local root exploit via the QEMU graphics driver Let’s exploit a SerenityOS kernel driver bug to get a root shell, and then fix the bug! 🐞🛠😎

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    Linux kernel: user-triggerable read-after-free crash or 1-bit infoleak oracle in open(2): Posted by Solar Designer on Jan 28Hi, First, to avoid such questions or potential duplicate CVE ID assignment: I intend to request a CVE ID and post it as a…

    Poništi
  7. 28. sij
    Poništi
  8. proslijedio/la je Tweet
    27. sij
    Poništi
  9. proslijedio/la je Tweet
    23. sij

    Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:

    Poništi
  10. proslijedio/la je Tweet
    23. sij
    Poništi
  11. proslijedio/la je Tweet

    NSO statement in my inbox: This instance wasn't us, and we can prove it because our tech doesn't let us target US phone numbers. Again, NSO comms has lied to my face before, though this one seems unequivocal. Also, threatening lawsuits on this story, which is classy.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    22. sij

    Chrome has published it's 2020 plans for their CT Policy and associated engineering work -

    Poništi
  13. proslijedio/la je Tweet
    18. sij

    One last shill for my talks at : Kernel hacking like it's 2020: The magical fantasy land of Linux kernel testing: Would appreciate any feedback! Feel free to contact me publicly or privately :)

    Poništi
  14. proslijedio/la je Tweet
    22. sij

    I just published a ~45 page whitepaper on attacking and defending terraform infrastructure as code in GitHub. Includes attack scenarios, hardening, detections, etc. Deep thanks to and for their inspiration and research. ❤️ 1/3

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    12. sij

    Thanks to rapid and open data sharing by China CDC, Wuhan Institute of Virology, Institute of Pathogen Biology and Fudan University, we know genomes from 6 of the novel coronaviruses isolated in Wuhan. I've posted a tree of these viruses here: 1/4

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    20. sij
    Poništi
  17. proslijedio/la je Tweet
    19. sij

    tuptime: Report the historical and statistical real time of the system, keeping it between restarts. Like uptime command but with more interesting output.

    Poništi
  18. proslijedio/la je Tweet
    18. sij

    New blog post: cuck00 A XNU/IOKit info leak 1day killed in iOS 13.3.1 beta 2.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  20. proslijedio/la je Tweet
    17. sij

    I tried to explain the technical details of CVE-2020-0601 in a video:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·