Davy Douhine

@ddouhine

founder / pentester / climber / newbie | Computer security

Paris
Vrijeme pridruživanja: svibanj 2009.

Tweetovi

Blokirali ste korisnika/cu @ddouhine

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ddouhine

  1. Prikvačeni tweet
    27. pro 2019.

    Blue teamers you can target with this exploit... dropped yesterday ;) No RCE but a DoS: red teamers will lost their sessions, don't get new ones and will have to restart MSF. CVE-2019-5645

    Poništi
  2. proslijedio/la je Tweet
    prije 3 sata

    Don’t want to create a keystore to sign your Android app? You can use the debug keystore provided by the Android SDK tools. The file is stored at /.android/debug.keystore. 1/2 Want to learn more? Check out our Mobile Hacking Training

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    1. velj
    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Burp Suite Pro / Community 2020.1 released, with major enhancements to HTTP message editor and more,

    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Happy week, folks. This week's wrap-up has a sweet Meterpreter enhancement courtesy of , plus an in-depth look at our recent password-cracking overhaul thanks to longtime contributor h00die.

    Poništi
  6. proslijedio/la je Tweet
    29. sij

    Envie de secu, de soleil et de vraies vagues? Rejoignez les équipes de Bordeaux Métropole pour imaginer, construire et sécuriser la ville de demain.

    , , i još njih 2
    Poništi
  7. 31. sij

    "Building secure iOS apps" 30min for the builders... and the breakers of iOS app.

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    You want to practice and sharpen your weapons for mobile hacking ? Here are our next workshops (free) and trainings: And if you want to have a preview of the covered subjects, we are going to tweet in February.

    Poništi
  9. proslijedio/la je Tweet
    29. sij

    The first team Demo meeting of the year is posted! Nine new modules (RCE, privesc, DoS, directory traversal, oh my!) and a lot of enhancements and bug fixes, with demos from , , and . Catch it here:

    Poništi
  10. proslijedio/la je Tweet

    I'm a huge fan of the impressive security of the iPhone ...but sophisticated attackers ♥️ the fact that it's basically a blackbox, meaning their exploits & malware (if used correctly) will likely never be detected 😭

    Poništi
  11. proslijedio/la je Tweet
    28. sij

    Hurry up! You have until Friday to enjoy the early bird price (2599€ instead of 3199€) for our Mobile Hacking Training at in Amsterdam (April 20-22)

    Poništi
  12. proslijedio/la je Tweet
    28. sij

    Premier FIC pour nous cette année ! Si vous voulez nous rencontrer, demandez !

    Poništi
  13. proslijedio/la je Tweet
    27. sij

    Practicing or on a daily basis? Based in in Europe? Don't miss the opportunity to take my Burp Suite Pro training in 2020, either in Geneva (March) or Amsterdam (April)

    Poništi
  14. proslijedio/la je Tweet
    25. sij

    < 1 WEEK before Call for Papers closes! Submit your awesome talks proposals here: (RTs always appreciated)

    Poništi
  15. proslijedio/la je Tweet
    24. sij

    The weekly wrap-up is here! An inaugural piece from newer-comer to our team , there's 3 new modules (RCE, privesc, and directory traversal, anyone?) and quite a few improvements + bug fixes, too! Dig into the deets:

    Poništi
  16. proslijedio/la je Tweet
    23. sij

    Extremely thrilled to launch today. Thanks for everyone supporting this initiative. Together we will 👊

    Poništi
  17. proslijedio/la je Tweet
    24. sij

    We are happy to share our first ever TLP:WHITE exec. summary of our Threat Landscape Reports 🥳. It provides an overview of the direct threats to 🇪🇺 institutions, bodies & agencies. Oh and one more thing: we have also published 6 new Threat Memos:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    24. sij
    Poništi
  19. proslijedio/la je Tweet
    23. sij

    Forensic analysis of Jeff Bezos hacked iPhone was exploited via vulnerability that probably triggered RCE. Similar exploit was fixed in October 2019- CVE-2019-11932(double-free vulnerability) but instead of video it was triggered by GIF

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    17. sij

    Do you want to know more about Abusing Google Play Billing? Check out the presentation of Guillaume Lopes at . ;) 

    Poništi
  21. proslijedio/la je Tweet
    20. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·