Tweets

You blocked @daveaitel

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @daveaitel

  1. Retweeted
    Feb 2

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Undo
  2. Retweeted
    15 hours ago

    I’ve just uploaded my Jailbreak for the iPad Pro (2017) to GitHub. Right now, SSH and Sileo can be installed. Due to lack of devices, I cannot currently implement support for other devices. Feel free to create PRs if you would like to help me!

    Show this thread
    Undo
  3. 18 hours ago

    One of the great things in red Dead redemption 2 is that you can cook fish and various meat and then just if you're not hungry right now store them in your pocket so in my head your character just these pockets full of weird meat that they occasionally reach into

    Undo
  4. Retweeted

    A tour guide at the Monarch butterfly sanctuary in Michoacán has reportedly been found dead, just days after authorities discovered the body of Homero Gómez González, an activist who defended the sanctuary against illegal logging.

    Undo
  5. Retweeted
    20 hours ago

    Turns out my exploit reliably works also on Debian testing, with only a minor tweak to account for the different netcat flavor.

    Undo
  6. Retweeted
    21 hours ago

    this is extremely cool but all I can think about is how this spider is given away by its eyes so it’s basically IRL Ditto

    Undo
  7. Retweeted
    22 hours ago

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Undo
  8. Retweeted

    Dealing with the Deluge of Vendors. A thread. [full post here : ] Everyone is deluged by product and service vendors, small and large. Even vendors struggle to keep track of who are their competitors in an ever crowded market place. 1/24

    Show this thread
    Undo
  9. Retweeted

    Yet another fantastic, thoughtful piece. Win or lose, the campaign is a milestone for us, and a reminder of what's possible 🌊💪🌊💪🌊💪🌊 Mayor Pete’s Gay Reckoning

    Undo
  10. Retweeted
    Replying to and

    That is part of my fascination of the 2016 conflict. It was so completely one sided because of political and bureaucratic failures (amongst other reasons)... NSA could out 0day GRU any day of the week. So what? Those technical details are the least relevant for cyber power.

    Undo
  11. Retweeted
    Replying to and

    I guess there is my black hat asia 2018 keynote where I defined a bunch of metrics to use when evaluating a cyber threat actor... well, more like a state’s cyber capabilities and such. I didn’t spend much time on it unfortunately, but I have been planning on a full talk on it

    Undo
  12. Retweeted

    Since our last tweet inspired so many shudders, here's a friendly octopus doing morning stretches from last ROV livestream. Dives have been postponed. You can watch previous dives on our youtube:

    Undo
  13. Retweeted

    HEVD Exploits – Windows 7 x64 Arbitrary Write

    Undo
  14. Retweeted
    22 hours ago

    Cyber twitter - any recommendations on readings that wrestle with assessing threat actor / operation sophistication akin to 's the legend of sophistication in cyber operations / 's useful fundamental metrics for cyber power? Thanks in advance!

    Undo
  15. Retweeted
    Feb 1

    In the new Taylor Swift documentary, she says “my entire moral code is the need to be perceived as good” and I’m going to be thinking about this until I die.

    Show this thread
    Undo
  16. Retweeted
    Feb 2

    . has done some great work on Chrome and he explains this more recent V8 code change. It requires some changes to previous techniques, but Chome/V8 is still reliably exploitable.

    Undo
  17. Retweeted
    Feb 2

    And here’s a wonderful post by OpenSMTPD’s main developer : Very interesting insight on how a bug enters the code and becomes exploitable over time.

    Undo
  18. Retweeted
    Feb 2

    I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by You can find it here:

    Undo
  19. Retweeted
    Feb 2

    Looks better than the caulked doors at the other Wuhan hospitals

    Undo
  20. Retweeted
    23 hours ago
    Replying to

    Partly agree. State with an array containing 20 As vs 20 Bs may yield 100% identical behavior. There is too much useless state. New paths at least trigger some new behavior. Some interesting work by about other feedback like stack depth

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·