Sirko

@golle0x90

I'm a linux nerd ;) Vulnerability Research und Fuzzing

Vrijeme pridruživanja: listopad 2011.

Tweetovi

Blokirali ste korisnika/cu @golle0x90

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @golle0x90

  1. proslijedio/la je Tweet
    30. sij

    HWASAN (think of it as ASAN v2) has become available to developers on Android outside of Google. If you use C or C++ on Android, please give it a try. HWASAN is also available on Aarch64 Linux with a recent kernel.

    Poništi
  2. proslijedio/la je Tweet
    1. velj
    Poništi
  3. proslijedio/la je Tweet
    20. sij

    found 12 CVEs in Suricata with libFuzzer. Read more about it in his war story. You can find the full report here:

    Poništi
  4. proslijedio/la je Tweet
    15. sij

    with then you realize `grep memcpy` is still powerful to find vulnerabilities : CVE-2020-2573 (stack buffer overflow in libmysql out of bounds write) totally fixed in latest critical patch update

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    13. sij

    Just pushed out-of-band rule 2029255 - ET EXPLOIT Possible Citrix Application Delivery Controller Arbitrary Code Execution Attempt (CVE-2019-19781) M2 (exploit.rules) for additional coverage

    Poništi
  6. proslijedio/la je Tweet
    13. sij

    In this interview, our co-founder explains the advantages of in continuous integration. Read the full article

    Poništi
  7. proslijedio/la je Tweet
    10. sij

    The new year has already started and it is time for Bonn Security Night. We invite all , and enthusiasts to join us: 21.01.20, 18:30 o'clock in the office of . See you there!

    Poništi
  8. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    9. sij

    Another "nice" kernel bug that literally allows to write any memory on the machine by any user (you just give kernel any exact physical or virtual address): Again, killed before making it into any release:

    Poništi
  10. proslijedio/la je Tweet
    8. sij

    Linux Kernel Runtime Guard (LKRG) bypass collection by Ilya Matveychikov, CC

    Poništi
  11. proslijedio/la je Tweet
    7. sij
    Poništi
  12. proslijedio/la je Tweet
    24. pro 2019.

    An exciting year is coming to an end. The Code Intelligence Team would like to take this opportunity to thank you for your support and the good cooperation. We look forward to a successful new year with new exciting challenges. We wish you cozy holidays and a happy new year.

    Poništi
  13. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  15. proslijedio/la je Tweet
    13. pro 2019.

    Announcing the 5.0.1 release: Fixing lots of issues in 5.0 and improving performance.

    Poništi
  16. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    10. pro 2019.

    Learn how found and exploited SockPuppet for iOS 12.4, featuring a bonus collaboration with LiveOverflow!

    Poništi
  18. proslijedio/la je Tweet
    3. pro 2019.

    Don't miss out on our talk 'Developers Are Not the Enemy!' tomorrow at 16:45 in Sindelfingen at the Embedded Software Engineering Congress. and Paul Corrales will tell you more about the human factor, fuzzing and the future of secure software.

    Poništi
  19. proslijedio/la je Tweet
    2. pro 2019.

    Today ONLY - 20% off current training like TWO 2-day "live" events in Washington DC with and and 5-day Dev Deep Dive in Berlin with ! Don't miss it - details here . Discount code? Email us, info@oisf.net.

    Poništi
  20. proslijedio/la je Tweet
    27. stu 2019.

    Matt Morehouse's talk on GWP-ASan is out.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·