@gr4yf0x

Physicist now mostly interested in security stuff

Vrijeme pridruživanja: rujan 2014.

Tweetovi

Blokirali ste korisnika/cu @gr4yf0x

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @gr4yf0x

  1. Prikvačeni tweet
    8. srp 2019.
    Poništi
  2. proslijedio/la je Tweet
    24. sij

    Lieber , gemeinsam - mit & - haben wir die -Arbeit bei "Cybersicherheit" analysiert und für den aufgeschrieben. Als Bewertung würden wir "erstklassig" eher nicht in Betracht ziehen.

    Poništi
  3. proslijedio/la je Tweet
    22. sij

    Need to make sure you always pass the build? Use volkswagen, it detects if it’s running in CI and then makes sure you pass! Thanks for sharing this!

    Poništi
  4. proslijedio/la je Tweet
    20. sij

    Nice collection of chrome sandbox escape POCs/exploits and methodology, go check it out !

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    17. sij

    I clicked on this video because of clickbait, and it turned out to contain actual great advice!

    Poništi
  6. proslijedio/la je Tweet
    14. sij

    The NSA immediately prior to hitting the submit button to report CVE-2020-0601:

    Poništi
  7. proslijedio/la je Tweet
    11. sij

    My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  9. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  10. proslijedio/la je Tweet

    Verzweifelter Mann im ruft schon zum 2. Mal den Notruf. Seine Schwiegermutter soll bitte gehen.

    Poništi
  11. proslijedio/la je Tweet
    30. pro 2019.

    The Junior-CTF challenges and some 'infrastructure' can be found at for those who are still curious. Thanks to and for providing some cool challenges and to all teams for playing.

    Poništi
  12. proslijedio/la je Tweet
    29. pro 2019.

    The One Weird Trick SecureROM Hates by at will start any minute now. You can watch it live:

    Poništi
  13. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  14. 24. pro 2019.

    Rant (GER) about OffSec Tools by someone who has to deal with the FireEye Salesman and alike day by day at work and who relies on public tools.

    Poništi
  15. proslijedio/la je Tweet
    11. pro 2019.

    Beautiful OpenBSD logic bugs are beautiful: Who needs memory corruption?

    Poništi
  16. proslijedio/la je Tweet
    4. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    2. pro 2019.

    Das passiert, wenn man Rechtsextreme, die sich als "besorgte Bürger" ausgeben, mit unbequemen rechtsextremen Wahrheiten konfrontiert. Bitte in jeder Journalistenschule ins Pflichtprogramm aufnehmen, großes Dankeschön an Theo Koll!

    Poništi
  18. proslijedio/la je Tweet
    29. stu 2019.
    Odgovor korisniku/ci

    It’s just for some old scene ppl right now. The stories will be collected, and where possible, made available. I’m trying to capture Hacker History.

    Poništi
  19. proslijedio/la je Tweet
    29. stu 2019.

    My first blogpost at is online: REST path traversal to admin privileges on

    Poništi
  20. proslijedio/la je Tweet
    29. stu 2019.

    A great thread; so great in fact, that I wish it was a blog post with a permanent link. Thank you for writing it.

    Poništi
  21. proslijedio/la je Tweet
    19. stu 2019.

    There are only 4 types of developers in meetings.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·