Tweetovi

Blokirali ste korisnika/cu @chasing0days

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @chasing0days

  1. proslijedio/la je Tweet
    23. sij

    Sharing a new demo + an article on BlueKeep dissection (CVE-2019-0708) using REVEN. See how data Tainting, Memory History, and its Python API streamline the RE process to quickly and accurately analyze the root-cause and behavior at the system level.

    Poništi
  2. proslijedio/la je Tweet
    21. sij

    UEFI_RETool - tool for UEFI firmware reverse engineering. Based on IDAPython, radare.

    Poništi
  3. proslijedio/la je Tweet
    16. sij

    If you’re tired of hearing about crypto32, elliptic curves, and other CVE-2020-0601 shenanigans, have a read over our new blog post on Windows’ Intel CET implementation in the face of SetThreadContext and NtContinue. Come for the exploit mitigation, stay for the XState Internals.

    Poništi
  4. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    5. sij

    I've developed a new technique for bypassing firewalls/NATs and producing full TCP/UDP session to targeted user. Anyone have RCE for a service that's typically only run behind NATs (eg desktop software like Sonos, Spotify, Dropbox, etc which bind to *) and want to merge projects?

    Poništi
  6. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    23. pro 2019.
    Poništi
  8. proslijedio/la je Tweet
    19. pro 2019.

    Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): Hoping to spread the RE fever :)

    Poništi
  9. proslijedio/la je Tweet

    macOS: Kernel use-after-free due to race condition in wait_for_namespace_event()

    Poništi
  10. proslijedio/la je Tweet
    17. pro 2019.

    Timeless Analysis of an out-of-bounds read in a TTF font file using REVEN -2019-1244

    Poništi
  11. proslijedio/la je Tweet

    Linux: privilege escalation via io_uring offload of sendmsg() onto kernel thread with kernel creds

    Poništi
  12. proslijedio/la je Tweet
    10. pro 2019.

    iOS firmware keys? gotta catch em' all.

    Poništi
  13. proslijedio/la je Tweet
    11. pro 2019.

    It's a brand new world for steganography and C2!!!! :)

    Poništi
  14. proslijedio/la je Tweet

    SockPuppet: A Walkthrough of a Kernel Exploit for iOS 12.4

    Poništi
  15. proslijedio/la je Tweet
    4. pro 2019.

    i have been laughing at this since yesterday. please turn your volume up 😂

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  17. proslijedio/la je Tweet
    5. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    30. stu 2019.

    Here is a recent writeup that I did. It's not as indepth as I want. I'll write a definitive guide for hunting these bugs starting with 0 knowledge when I'm home in a few weeks. I'll also upload all my pocs to github, including recent bugs. I'm pissed. Bye

    Poništi
  19. proslijedio/la je Tweet
    22. stu 2019.

    Just published my scripts to reconstruct Microsoft COM-Code. Tested on v7.4 and Python v2+3 => Happy reversing!

    Poništi
  20. proslijedio/la je Tweet
    22. stu 2019.

    Introducing the fzero fuzzer! A target-architecture-agnostic grammar-based fuzzer (inspired by F1). With no input size constraints, multi-thread support, and all Rust code for no corruption bugs. 5x faster than the worlds fastest grammar-based fuzzer ;D

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·