john spike smith

@coldhorizon

Security interested, so programming lenguajes, operative systems, music several kind of, coldplay rocks, reader of classics, just another wako OpenBSD user!

lands end
Vrijeme pridruživanja: studeni 2011.

Tweetovi

Blokirali ste korisnika/cu @coldhorizon

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @coldhorizon

  1. proslijedio/la je Tweet
    prije 7 sati

    🔥 CVE-2019-18426 for Web and Desktop contained multiple vulnerabilities, which, when combined together, could have even allowed remote attackers to read files from a victim's local file-system just by sending messages. Read details:

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    He subido actualizados los materiales (slides, demos y prácticas) del taller de reversing con que hice en el finde pasado. Espero que los asistentes lo disfrutárais tanto como yo impartiéndolo. Nos vemos pronto! 👉

    Poništi
  3. proslijedio/la je Tweet

    Yet Another Sudo ! When 'pwfeedback' is enabled, a new Sudo bug could let low privileged & users (or malicious programs) execute arbitrary commands with 'root' privileges. Details for CVE-2019-18634 ➤

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    29. sij

    Implemented a PoC for disabling kernel lockdown on Ubuntu via a keyboard emulated through USB/IP, CC

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    3. velj

    CVE-2020-7471: SQLI in Django: django.contrib.postgres.aggregates.StringAgg aggregation function was subject to SQL injection, using a suitably crafted delimiter. FIX:

    Poništi
  6. proslijedio/la je Tweet
    3. velj
    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  8. proslijedio/la je Tweet
    3. velj
    Poništi
  9. proslijedio/la je Tweet
    3. velj

    Estoy haciendo un detector de penes. Por favor, envíad fotos de penes por whatsapp a este número de teléfono: 663700989. Muchas gracias!

    Poništi
  10. proslijedio/la je Tweet
    3. velj
    Poništi
  11. proslijedio/la je Tweet
    3. velj
    Poništi
  12. proslijedio/la je Tweet
    3. velj

    Creating payloads without "'`()[]\%; by ... that's useful...

    Poništi
  13. proslijedio/la je Tweet
    3. velj

    Automating Rails Database Migrations on Heroku: (There's a new Release Phase in town.)

    Poništi
  14. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  15. proslijedio/la je Tweet
    2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  16. proslijedio/la je Tweet
    2. velj

    How to Perform Concurrent HTTP Requests in Ruby and Rails:

    Poništi
  17. proslijedio/la je Tweet
    2. velj
    Poništi
  18. proslijedio/la je Tweet
    2. velj
    Poništi
  19. proslijedio/la je Tweet
    2. velj
    Poništi
  20. proslijedio/la je Tweet
    2. velj

    micro, a modern and intuitive terminal-based text editor $ doas pkd_add -v micro

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·