cndycc

@cndycc

Malware|Reverse Engineering

Berlin
Vrijeme pridruživanja: srpanj 2010.

Tweetovi

Blokirali ste korisnika/cu @cndycc

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cndycc

  1. proslijedio/la je Tweet
    27. sij

    . recently decommissioned their Adversary Tactics: course, and rather than let it collect dust, they offered it up to the community for free in the spirit of their commitment to transparency.

    Poništi
  2. proslijedio/la je Tweet
    28. sij

    The 360 Alpha team helped Apple to fix 0-click RCE & memory leak bugs in CoreBluetooth, which could allow attackers near by to remote control any Mac systems with zero interaction.

    Poništi
  3. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    26. sij
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  6. proslijedio/la je Tweet
    13. sij
    Poništi
  7. proslijedio/la je Tweet
    11. sij

    Interesting project to learn about OS internals and Rust: Writing an Os in Rust

    Poništi
  8. proslijedio/la je Tweet
    11. sij
    Poništi
  9. proslijedio/la je Tweet
    9. sij
    Poništi
  10. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    9. sij

    Fuzzing JavaScript WebAssembly APIs with Dharma/Domato (Chrome/v8)

    Poništi
  12. proslijedio/la je Tweet
    8. sij

    33 years ago today, the Commodore Amiga 500 was first revealed at CES Las Vegas.

    Poništi
  13. proslijedio/la je Tweet
    4. sij

    A-Course-on-Digital-Forensics:- A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University.

    Poništi
  14. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  15. proslijedio/la je Tweet
    26. pro 2019.

    New blogpost: Sanitized Emulation with QEMU-AddressSanitizer I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    19. pro 2019.

    Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): Hoping to spread the RE fever :)

    Poništi
  17. proslijedio/la je Tweet
    23. pro 2019.

    Automated AD lab deployment. Really awesome work

    Poništi
  18. proslijedio/la je Tweet

    [CPR-Zero] CVE-2019-1286 (Windows Kernel): Null Pointer Dereference in the AlphaBlend function in win32kfull.sys

    Poništi
  19. proslijedio/la je Tweet
    24. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    23. pro 2019.

    Almost forgot – if you'd like to play with the Go decompilation plugin, it is open-source:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·