Cory Duplantis

@ctfhacker

Low level infosec Rust | Python Fuzzing | Program Analysis RE

Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @ctfhacker

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ctfhacker

  1. 3. velj

    Is there an equiv to /proc/cpuinfo for Windows besides coreinfo? Coreinfo doesn't have what I'm interested in sadly.

    Poništi
  2. 28. sij

    Sometimes all you need is a bit of a nice looking status screen to brighten your fuzzing time.. ?

    Poništi
  3. 20. pro 2019.

    Merry freaking Christmas! Finally have my first real project fuzzing in barbervisor. This was a fuzz run that used to take 15 to 20 sec per fuzz case and now is doing 11 cases per sec. It already repro'ed the same bug organically that took the old fuzzer a week to find.

    Poništi
  4. 12. pro 2019.

    Ups and downs.. but am finally able to repro a fuzz case that was 1 exec/15 sec to 5 exec/sec/core in my hypervisor (name pending). Snapshot fuzzing is so much fun to work in.

    Poništi
  5. 11. pro 2019.

    Want a EVTX to JSON converter that is blazing fast, easy, and safe (maybe for ), look no further than

    Poništi
  6. 26. stu 2019.

    Just getting into the optimization game. Are there any other recommended reads besides the Agner Fog manuals?

    Poništi
  7. proslijedio/la je Tweet
    6. stu 2019.

    We recently improved our ctags fuzzer to use some keywords from a dictionary and now we're fuzzing all parsers and some command line flags too. We found another NULL deref, an OOB global read, and of course... and OOB controlled global write :D

    Poništi
  8. 1. stu 2019.

    First huge breakthrough this week. Finally reproduced a snapshot of 14B instructions in my bare metal hypervisor. Now, off to multicore the process. Luckily, things /should/ already be in place. *Cross fingers*

    Poništi
  9. 13. ruj 2019.

    Disregard.. they released it? no idea

    Prikaži ovu nit
    Poništi
  10. 13. ruj 2019.

    Derp. Someone sat on . If folks are curious, just go to for now.

    Prikaži ovu nit
    Poništi
  11. 26. kol 2019.

    Updated 's code coverage tool for TTD to output drcov format for Lighthouse.

    Poništi
  12. 8. lip 2019.

    Mobile pentesters.. how often are you looking at native code for bugs vs bugs in the app itself? Having no mobile experience, am curious of what the typical attack surface is like.

    Poništi
  13. 1. tra 2019.

    For those more versed in Windbg TTD, Does Page Heap current work with Windbg Time Travel?

    Poništi
  14. 2. ožu 2019.

    Thought of the day: why haven't we digitized smells yet?

    Poništi
  15. 18. sij 2019.
    Poništi
  16. proslijedio/la je Tweet
    20. lis 2018.

    "if it's not open source you cannot audit it"

    Poništi
  17. proslijedio/la je Tweet
    19. lis 2018.

    Print your own Android 0day with the World's Worst Android Kernel Fuzzer

    Poništi
  18. 11. lis 2018.

    Finally got EpicTreasure on an automated build system with . docker pull ctfhacker/epictreasure

    Poništi
  19. 10. lis 2018.
    Poništi
  20. 8. lis 2018.

    My Level 6 writeup with symbolic execution and Binary Ninja @vector_35

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·