Tweetovi

Blokirali ste korisnika/cu @CaptnBanana

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @CaptnBanana

  1. Prikvačeni tweet

    Pwning for the PwnDebian challenge. Found a command injection hidden in a crafted binary. Fixed in master as of yesterday

    Prikaži ovu nit
    Poništi
  2. 16. sij

    More stuff: Exploiting a Use-After-Free, based on a 36C3 CTF challenge:

    Poništi
  3. proslijedio/la je Tweet
    10. sij

    Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)

    Poništi
  4. 1. sij

    New year, new merch - shipped with every radare2 pro license. Be like and get yours now!

    Poništi
  5. I've just published my CTF writeups: Thx to for hosting it

    Poništi
  6. proslijedio/la je Tweet

    You want to play some before 2019 ends? got you covered! -> (powered by ) ->

    Poništi
  7. proslijedio/la je Tweet
    20. pro 2019.

    Cutter v1.10 now has a DEBUGGER! 🐞🥳 After a lot of work, we are so happy to announce that we finally implemented your most requested feature. The beta version of the debugger is available NOW on our website >> List of features and what's coming next >>

    Prikaži ovu nit
    Poništi
  8. Check out this bearded guy and me presenting our exploit (CVE-2019-14745) at : We tried to fix the issue but found CVE-2019-16718 instead shortly before the talk ¯\_(ツ)_/¯

    Poništi
  9. proslijedio/la je Tweet
    12. pro 2019.
    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  11. proslijedio/la je Tweet
    26. stu 2019.
    Poništi
  12. proslijedio/la je Tweet
    23. stu 2019.

    An amazing video about "Arbitrary Code Execution in Zelda Ocarina of Time". Also great editing to show the complex memory interactions!

    Poništi
  13. Yo! New blog post: ROP on ARM with radare2 - with an exploitation challenge provided by / and a remote debugging setup:

    Poništi
  14. proslijedio/la je Tweet
    15. stu 2019.

    Awesome-AFL : A curated list of different AFL forks and AFL inspired with detailed equivalent academic papers with AFL-fuzzing tutorials

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    6. stu 2019.
    Prikaži ovu nit
    Poništi
  16. 6. stu 2019.
    Poništi
  17. proslijedio/la je Tweet
    5. stu 2019.

    TIL that you can create a temporary file on Linux that doesn't have a filename

    Poništi
  18. If you are interested in or other Linux containers, check out my blog post series covering all those kernel internals 🤓

    Poništi
  19. New Blog Post: In-Process Fuzzing With (also featuring Frizzer by and ):

    Prikaži ovu nit
    Poništi
  20. New blog post: How I Over-Engineered My Dotfiles -

    Poništi
  21. proslijedio/la je Tweet
    12. lis 2019.

    Hacking the PS2 with Yabasic:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·