Jose Carlos Luna

@dreyercito

Curious by nature. CTF player team . Software engineer at . Challenges are my passion.

Geneve
Vrijeme pridruživanja: lipanj 2009.

Tweetovi

Blokirali ste korisnika/cu @dreyercito

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dreyercito

  1. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    Any advisory that contains the line “to overcome this limitation we drew inspiration from the Morris worm” in 2020 is pure gold. Team Qualys continues their retro onslaught vs OpenBSD.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    11. sij

    Witnessed the most amazing thing on the train to Edinburgh yesterday. A guy boarded in Wigan & sat opposite me. He went to sleep for an hour. When he woke up he bought a sandwich, ate it & went back to sleep. (This isn’t a maths test, you don’t need to know the distance/speed).

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    9. sij

    Me. You. Us. Always.

    Poništi
  5. proslijedio/la je Tweet
    10. sij
    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    28. pro 2019.

    I struck on gold. Probably the best sticker in

    Poništi
  7. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  8. proslijedio/la je Tweet
    30. stu 2019.

    RT [private] Notes on reverse engineering the BTLE protocol of a fire weather radio.

    Poništi
  9. proslijedio/la je Tweet
    25. stu 2019.
    Poništi
  10. proslijedio/la je Tweet
    24. stu 2019.

    Crypto is a tool for turning a whole swathe of problems into key management problems. Key management problems are way harder than (virtually all) cryptographers think.

    Poništi
  11. proslijedio/la je Tweet
    12. stu 2019.

    NTLM reflection is back to haunt windows. Read about Ghost Potato here (this time with a fixed link):

    Poništi
  12. proslijedio/la je Tweet
    10. stu 2019.

    Someone sent me this. I don't remember who tho I apologize. Just wanted to share it. If the original author of this picture sees this please let me know to give you proper credit.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    7. stu 2019.

    Been breached? Not sure how to blame someone else for it? Help is at hand!

    Poništi
  14. proslijedio/la je Tweet
    30. lis 2019.

    Expoiting prototype pollution – RCE in Kibana (CVE-2019-7609)

    Poništi
  15. proslijedio/la je Tweet
    26. lis 2019.

    pCraft: a PCAP Crafter, which creates a PCAP from a YAML scenario, by

    Poništi
  16. proslijedio/la je Tweet
    21. lis 2019.
    Poništi
  17. proslijedio/la je Tweet
    13. lis 2019.

    No telnet or netcat/nc? Use curl with telnet://host:port :)

    Poništi
  18. proslijedio/la je Tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    27. ruj 2019.

    ReversingHero - Learn Reverse Engineering

    Poništi
  20. proslijedio/la je Tweet
    26. ruj 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·