Stéphane Emma

@defane

Working in infosec - Interest in electronics and ham radio stuff

Luxembourg
Vrijeme pridruživanja: travanj 2009.

Tweetovi

Blokirali ste korisnika/cu @defane

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @defane

  1. proslijedio/la je Tweet
    23. lis 2019.

    Slides of my yesterday workshop are now online.

    Poništi
  2. proslijedio/la je Tweet
    11. lis 2019.

    The hall-of-fame for 2019 is live:

    Poništi
  3. proslijedio/la je Tweet
    27. ruj 2019.

    A HUGE thank you to everyone who made this our biggest FLARE On challenge yet! You can get all of the solutions to on our blog:

    Poništi
  4. proslijedio/la je Tweet

    A tous les francophones passionnés d', d', de , d', etc. J'ai créé une instance RocketChat afin de pouvoir échanger sur ces sujets. L'accès est ouvert à tous. Plus d'info: N'hésitez pas à partager et à RT

    Poništi
  5. proslijedio/la je Tweet
    28. svi 2019.
    Poništi
  6. proslijedio/la je Tweet

    Are you interested by more hijacking? Look at our research: We identified an actor (different than DNSpionage) targeting primarily national security organizations in the Middle East and North Africa. The modus operandi is really smart...

    Poništi
  7. proslijedio/la je Tweet
    28. ožu 2019.

    PoC||GTFO Issue 0x19 has now been processed by the amazing Internet archive, so you can now read it online without downloading anything.

    Poništi
  8. proslijedio/la je Tweet
    23. ožu 2019.

    Slides + Demo (functional this time ^^) + source code commited on my Github repository cc and others !! Thank you for this opportunity

    Poništi
  9. proslijedio/la je Tweet
    14. ožu 2019.

    Released another video: Reverse engineering a real-world embedded firmware encryption with !

    Poništi
  10. proslijedio/la je Tweet

    Our research about is online: A malware developed by the author of . It's interesting to see that someone stole his work & is trying to sell it on another platform. Look the promotion video, we put in the post with

    Poništi
  11. proslijedio/la je Tweet
    8. ožu 2019.

    Updated Analysis of PatchGuard on Windows 10 RS4 : following , my paper is out!

    Poništi
  12. proslijedio/la je Tweet
    4. ožu 2019.
    Poništi
  13. proslijedio/la je Tweet
    26. velj 2019.

    only few days after : firmware extract. (cc ), emulation, fuzzing->1st stack based BoF triggered and it will not be the last one I think (NX only) thx for the training :D

    Poništi
  14. proslijedio/la je Tweet
    22. velj 2019.
    Poništi
  15. proslijedio/la je Tweet
    Poništi
  16. proslijedio/la je Tweet
    19. velj 2019.

    A bit old but could be useful for ur next : full for stored and more through (not up-to-date) Edge/I.E browsers. -2018-8495 payload: - Initial paper

    Poništi
  17. proslijedio/la je Tweet
    Poništi
  18. proslijedio/la je Tweet
    18. velj 2019.
    Poništi
  19. proslijedio/la je Tweet
    19. velj 2019.

    Slides for presentation "macOS: how to gain root with CVE-2018-4193 in < 10s" are available!

    Poništi
  20. Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·