Tweetovi

Blokirali ste korisnika/cu @daniel_rome

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @daniel_rome

  1. 31. sij

    Automatic ROP Chain Generation

    Poništi
  2. proslijedio/la je Tweet
    28. sij

    Check out ' tips on Fuzzing, to overcome known challenges and maximize results:

    Poništi
  3. proslijedio/la je Tweet
    20. sij
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    8. sij

    I just added a little video demonstrating some of the features of Fuzzowski to create very simple fuzzers directly from the command line! /cc

    Poništi
  5. proslijedio/la je Tweet
    20. pro 2019.

    Cutter v1.10 now has a DEBUGGER! 🐞🥳 After a lot of work, we are so happy to announce that we finally implemented your most requested feature. The beta version of the debugger is available NOW on our website >> List of features and what's coming next >>

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    17. pro 2019.

    A wild new version of Fuzzowski with a lot of changes appeared! - Now you can also define Responses to requests, that sets vars and help to build stateful fuzzers - All data (mutants) generation, and Fuzzing Session fully recoded! /cc

    Poništi
  7. proslijedio/la je Tweet
    20. stu 2019.

    CFP is ending 2nd of December. Don't forget to submit your talk!

    Poništi
  8. proslijedio/la je Tweet
    14. stu 2019.

    Here are my slides from about exploiting CVE-2018-8611: Super fun bug to exploit imo. Most common question was if the inc primitive is really practical. The answer is yes. Use a series of 8 single byte increments at different addr alignments.

    Prikaži ovu nit
    Poništi
  9. 23. lis 2019.
    Poništi
  10. 6. lis 2019.
    Poništi
  11. proslijedio/la je Tweet
    4. lis 2019.
    Poništi
  12. proslijedio/la je Tweet
    30. ruj 2019.

    and I in our printers research talk at , watch it if you missed it!!

    Poništi
  13. proslijedio/la je Tweet
    27. ruj 2019.

    I contributed a kernel pwnable challenge to the r2con 2019 CTF organized by and . Unfortunately it went unsolved... I've pushed it to , and will later update source code and [even later] exploit. Let me know if you give it a try!

    Poništi
  14. 26. ruj 2019.

    Did you miss our talk at ? you can now watch this talk version (with other exploits and post-explotation demos) on YouTube /cc

    Poništi
  15. proslijedio/la je Tweet
    26. ruj 2019.

    New 44CON TV video: Office Equipment: The Front Door To Persistence On Enterprise Networks - D. Romero and M. Rivas

    Poništi
  16. proslijedio/la je Tweet
    11. ruj 2019.

    Rise and shine, it's time! Or lie in a little longer because registration won't open until 18:00... First talks are: Owning The Cloud Through SSRF by and Mundane office equipment: The front door to persistence on enterprise networks by and

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    9. ruj 2019.

    Opening with the Community Evening this Wednesday! and... you know what's the best? You can attend for free! register here /cc

    Poništi
  18. 1. ruj 2019.

    Really happy to have participated (with ) at 2019 edition! Great people and an excellent organization! Thank you all!

    Poništi
  19. proslijedio/la je Tweet
    1. ruj 2019.

    Have you ever wondered what it takes for a real company to run a "simulated" worm in their real internal networks and how we made it happen? Join our talk, last day/slot at (with )

    Poništi
  20. proslijedio/la je Tweet
    30. kol 2019.

    Is everyone ready for the r2con CTF? It starts in 2h...

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·