Daniel Pagan

@ghost_pep

Hacker . Sealandic lord. Defcon TV Goon. Georgia Tech grad 🐝 Mostly appsec stuff and sometimes Rust dev 🦀

Vrijeme pridruživanja: prosinac 2017.

Tweetovi

Blokirali ste korisnika/cu @ghost_pep

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ghost_pep

  1. 4. velj

    TIL that Rayon is ultra low effort parallelism if you are using iterators in

    Poništi
  2. 31. sij

    Woke up early for my flight to . Hacker boi inbound!

    Poništi
  3. proslijedio/la je Tweet

    It has been 0 days since I showed coworkers the cursed Instant::now() code from Rust stdlib

    Prikaži ovu nit
    Poništi
  4. 29. sij

    Also I somehow perfectly fit twitters character limit with that one lol

    Prikaži ovu nit
    Poništi
  5. 29. sij

    Windows question! I get the ideas behind IRPs but I'm wondering about FastIO. It says its for cached files, which makes sense for reads but what about writes? Don't writes have to go to disk for filesystem reliability? Or does it bypass the upper stack and directly write to disk?

    Prikaži ovu nit
    Poništi
  6. 19. sij

    Mainframes are cool

    Poništi
  7. proslijedio/la je Tweet
    16. sij

    📢 Announcing better support for fuzzing with structured inputs in Rust! 📢 New releases of `cargo fuzz`, `libfuzzer-sys`, and `arbitrary` better support writing fuzz targets that take well-formed instances of custom input types. Details:

    Poništi
  8. 16. sij

    Does AFL for linux have any dependencies on x86? Basically I want to cross compile for a non standard architecture. If not, are there any other that can do this?

    Poništi
  9. proslijedio/la je Tweet
    2. sij

    today's fun fact: there's a virus called Tai-Pan.666, D2D, or Doom2Death, which supposedly tries to find and destroy pirated copies of Doom II.

    Prikaži ovu nit
    Poništi
  10. 31. pro 2019.

    Publishing anything to do with cryptography results in criticism from hordes of people who have not read your paper 🤔

    Poništi
  11. proslijedio/la je Tweet

    "In the Hieronymuss Bosch's "The Garden of Earthly Delights" painting there is some music written on the butt of one of the characters in hell. But how sounds this 15th Century melody? Here is how is the 600-years-old butt music from hell sounds: "

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    30. pro 2019.

    prediction: people whose job is to publish papers about "attacks" will disagree, yet will only have speculative arguments ("what if..") even if you disagree, the inconsistency of round numbers and their unscientific selection are indisputable

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    🚨 The reference implementation reached beta! 🥳 age(1) — a simple, modern, secure file encryption tool.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    I implemented AES128 in 69 bytes of x86 assembly. (from challenge 0). Can anyone beat that? :P

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    25. pro 2019.

    Been *slowly* learning Rust. Decided to work on porting 's SeatBelt to it as a intro project since Seatbelt is awesome and it covers a lot of useful, but small and easily digestible things to try and do. Finally got it in a working state today.

    Poništi
  16. proslijedio/la je Tweet
    24. pro 2019.

    A lot of mud slinging on InfoSec twitter lately; I wanted to flip the script a bit and highlight the blogs, tools, talks etc that I keep coming back to on a regular basis, both as a defender and general InfoSec professional. Thread..

    Prikaži ovu nit
    Poništi
  17. 21. pro 2019.

    I made this challenge awhile ago based on a real world exploit I found while on an engagement. Was an opportunity to try out for CTF style web problems 😀

    Poništi
  18. proslijedio/la je Tweet
    5. pro 2019.

    There were two CVE's that came out of last month's competition, both found by the team: CVE-2019-19250 and CVE-2019-19249. The OpenTrade SQL Injection vuln (9.8/critical) was patched during the event.

    Poništi
  19. proslijedio/la je Tweet
    5. pro 2019.

    Thanks to 's PR hashcat now has a 100% pure GPU implementation of ECC secp256k1. All instructions are executed on GPU without any CPU hook code. Performance on Electrum 4/5 Wallet cracking improved from 49kH/s to 201kH/s

    Poništi
  20. proslijedio/la je Tweet

    A very cool toy on loan to me from ... For those of you unfamiliar with autodialers, they’re machines that systematically try every combination on a safe until the correct one is found. 😳

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·