Tweetovi

Blokirali ste korisnika/cu @d0lph1n98

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @d0lph1n98

  1. proslijedio/la je Tweet
    2. velj

    I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by You can find it here:

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Friday night trivia (harder than the previous ones... if you're a kid 😋): do you remember this patch?

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Feynman Lessons for Learning: 🧠 1) Understanding is more important than memorization! 2) Learn principles, not formulas. 3) Ask questions! 4) Read Books every day. 5) Teaching is a powerful tool to learning.

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    discovery of the day: you can apply structure offsets to a selection of code 🤯 select code range, press T, select your structure, be amazed

    Poništi
  5. proslijedio/la je Tweet
    22. sij

    Yesterday I learned (YIL?) that even if a type is standard layout, and trivially copyable, it is not always safe, even in practice, to use it a destination for std::memcpy or to zero it with std::memset. That is, the following is not safe:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    20. sij

    my new current project. automatic ropchain generation!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    30. stu 2019.

    HOW TO GIVE A CONFERENCE TALK IN FIVE EASY STEPS 1. Write the outline! It'll help you collect your thoughts and make a good talk!!! 2. Write a first draft! Doesn't need to be that good, just get your thoughts down!!! 3. Rehearse! Read the draft aloud and see if it sounds good!

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    15. sij

    Ghidra Script that sets the names for missing function names by looking for relevant patterns in the binary! Hope that will help you too :)

    Poništi
  9. proslijedio/la je Tweet
    12. sij

    I’ve been noticing a lot of posts about how hard it is to get even entry level jobs. So instead of feeling bad about it, let’s do a thread! If you’re hiring, please comment and RTweet for coverage. If you’re looking, please do the same. Also I’m looking! 🙋🏻‍♀️

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  11. proslijedio/la je Tweet
    10. sij

    Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)

    Poništi
  12. proslijedio/la je Tweet
    9. sij

    Into exploit development and reverse engineering? Willing to work with binary code? is actively seeking new Security Researcher members to join its team. Apply at or feel free to send me a DM with any questions you may have.

    Poništi
  13. proslijedio/la je Tweet
    9. sij

    Phil Koopman has shared an excellent collection of software safety case studies here: We think that all embedded engineers should be familiar with these case studies. We cannot afford to lose these costly lessons.

    Poništi
  14. proslijedio/la je Tweet
    3. sij

    Here is a list of words to mute on Twitter if you would like to see less suggested noise on your timeline. You’re welcome.

    Poništi
  15. 2. sij

    *into the BS core logic

    Prikaži ovu nit
    Poništi
  16. 2. sij

    TIL hardware fault used to be injected via the boundary scan core logic which is commonly used for the self test.

    Prikaži ovu nit
    Poništi
  17. 1. sij

    Stuck at the same company for 5 years now. I am looking for a new role in vulnerability research. Willing to relocate if necessary. Whoever read this, ping me if you got one. I’ll send you a copy of my resume.

    Poništi
  18. proslijedio/la je Tweet
    28. pro 2019.

    When you’re looking at a subroutine for 2 nights straight to understand why the developer was trying to “mask” your input with these hex values before password validation..and then you find out that it’s just an optimized implementation of strlen()💀

    Prikaži ovu nit
    Poništi
  19. 15. pro 2019.
    Poništi
  20. 14. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·