n33trix

@glitchnsec

Vulnerability Research, Security Engineering, Penetration Testing.

Toronto, Ontario
Vrijeme pridruživanja: kolovoz 2018.

Tweetovi

Blokirali ste korisnika/cu @glitchnsec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @glitchnsec

  1. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  2. 6. sij
    Poništi
  3. proslijedio/la je Tweet
    17. pro 2019.

    Timeless Analysis of an out-of-bounds read in a TTF font file using REVEN -2019-1244

    Poništi
  4. proslijedio/la je Tweet
    16. pro 2019.

    Here is part one. Pretty sure the attack surface described has many more bugs (not just the vmware tools installer.. I doubt this bug is exploitable in the first place, just wanted something to demo that is unpatched, easier for folks to learn!)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  6. proslijedio/la je Tweet
    9. pro 2019.

    I wrote a guide for beginners about windows library code:) In this guide I describe how the compilation and linkage model works in windows at the assembly level - static and dynamic libraries, etc. Have fun 🙃

    Poništi
  7. proslijedio/la je Tweet
    25. stu 2019.

    New blog post about spidermonkey in Chinese. Thanks for awesome work. . I just read his blog and rewrite it.

    Poništi
  8. proslijedio/la je Tweet
    21. stu 2019.

    Minor release of py-automl is out! Added histograms and running pandas functions straight on object itself, + more! If you're looking for a package to automate your Data Science workflow, give it a look and let me know of any feedback!

    Poništi
  9. proslijedio/la je Tweet
    14. stu 2019.

    Once again, AbdulAziz Hariri will share his amazing research at ! A true sad story of Adobe Reader’s Onix component :(

    Poništi
  10. proslijedio/la je Tweet
    20. lis 2019.
    Poništi
  11. proslijedio/la je Tweet
    9. lis 2019.

    Recently I have been working on mapping Window API calls to event IDs within Sysmon. Today I am releasing this project and a blog to talk about this more! Project: Blog:

    Poništi
  12. proslijedio/la je Tweet
    8. lis 2019.

    I've digged up some ancient versions of Adobe Reader to figure out exactly which symbols were public in which builds and when. Turns out all the core modules had them at some point. My full analysis on the P0 blog:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    25. ruj 2019.

    Written a new blog in my Windows Exploitation Tricks series, how to spoof the named pipe client PID.

    Poništi
  14. proslijedio/la je Tweet
    26. ruj 2019.

    We are proud to launch our brand new interactive XSS cheatsheet featuring novel vectors from

    Poništi
  15. proslijedio/la je Tweet
    17. ruj 2019.
    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    15. ruj 2019.

    If you haven't met and , you should. They are legitimately good human beings. Some of you know this, but for the rest of you: was arrested leaving . Many of us had been in Vegas for a LONG time (or as in my case, already gone). 1/

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    13. ruj 2019.

    The following paths within %windir% are writable by any user. Now you know. Security descriptor auditing is valuable.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    3. ruj 2019.

    I’ve decided to write up one of the iOS exploits in a new series, walking through each step of the underlying exploit development process. Hope these post will be more accessible for ppl trying to learn exploit dev and understand how exploit devs think.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet

    I'm proud to announce we are, for the first time EVER, releasing official documentation which defines the criteria around security boundaries, features & mitigations in Windows: .

    Prikaži ovu nit
    Poništi
  20. 5. kol 2019.

    In my latest posts, I share some of the resources I use and the people in the industry that have had a strong positive influence to my growth in the field.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·