emdel

@emd3l

Tech Lead/Security Researcher at - Italian, Hackademic, Malware, Memory Forensics, Automation - Opinions are my own.

Vrijeme pridruživanja: listopad 2009.

Tweetovi

Blokirali ste korisnika/cu @emd3l

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @emd3l

  1. Prikvačeni tweet
    2. stu 2016.

    It looks like my Ph.D thesis "Advances in Modern Malware and Memory Analysis" is available at:

    Poništi
  2. proslijedio/la je Tweet
    prije 11 sati
    Poništi
  3. proslijedio/la je Tweet
    prije 21 sat

    Yet another vulnerability in sudo

    Poništi
  4. proslijedio/la je Tweet
    prije 6 sati

    I have published my tools to dump Dwarf debug information on huge libraries (e.g. Chromium):

    Poništi
  5. proslijedio/la je Tweet

    It is always fantastic to bring some micro-architectural magic to our community at ! The talk was *heavily* inspired by the awesome work of Check my slides at:

    Poništi
  6. proslijedio/la je Tweet
    2. velj
    Poništi
  7. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  8. proslijedio/la je Tweet
    1. velj
    Poništi
  9. proslijedio/la je Tweet
    31. sij

    "Parallelizing Binary Code Analysis", Meng et al. Parallelizes Dyninst to improve control/data flow analysis + debug information parsing performance. Uses perf analysis to identify expensive code and applies race detectors to guide synchronization.

    Poništi
  10. proslijedio/la je Tweet

    Remote Code Execution and Sensitive Information Theft in Microsoft Azure, along with infrastructure overview (2 Parts):

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    30. sij
    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    31. sij
    Poništi
  13. proslijedio/la je Tweet
    30. sij

    New writeup by me and of a new Iranian campaign we discovered! Special thanks to for assisting as well!

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  15. proslijedio/la je Tweet
    29. sij

    “To overcome these limitations, we drew inspiration from the Morris worm... which exploited the DEBUG vulnerability in Sendmail by executing the body of a mail as a shell script” oss-security - LPE and RCE in OpenSMTPD (CVE-2020-7247)

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    29. sij

    CanSecWest is offering a free training and conference admission to the top 4 talk submissions from someone 25 or younger! All qualifying submissions also get a 10% discount on conference ticket. That’s basically a $5000 USD grant to the top 4 submissions. Please share!

    Poništi
  17. proslijedio/la je Tweet
    30. sij

    -- Just found out the zine is out! Look out for a paper on modern ELF infection techniques with SCOP binaries.

    Poništi
  18. proslijedio/la je Tweet
    29. sij

    We are happy to announce our second speaker Mariano Graziano with the talk: "2020: A Phishing Odyssey".

    Poništi
  19. proslijedio/la je Tweet
    29. sij

    Interesting piece on why security industry must improve ties with academia

    Poništi
  20. proslijedio/la je Tweet
    29. sij

    Hugely impressive amount of work in a very short amount of time. The github looks like a great resource for people to learn from:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·