HackSys Team

@HackSysTeam

Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning

India
Vrijeme pridruživanja: rujan 2012.

Tweetovi

Blokirali ste korisnika/cu @HackSysTeam

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @HackSysTeam

  1. Prikvačeni tweet
    7. sij

    I'll be teaching Windows Kernel Exploitation Foundation and Advanced (2 days) each Vancouver. Register if kernel exploitation excites you. cc:

    Poništi
  2. proslijedio/la je Tweet
    prije 12 sati

    just found that this writeup for CVE-2019-9793, a range analysis bug in Spidermonkey found by and analyzed by me is now unrestricted: I thought it was a cool bug, although unfortunately Spectre mitigations prevented exploitation as far as I know

    Prikaži ovu nit
    Poništi
  3. prije 23 sata

    I'll be giving out a free seat for the Windows Kernel Exploitation Foundation & Advanced (3 days) training course Goa 2020 to a woman in security with a keen interest in vulnerability research and exploit development. Please DM me if interested.

    Poništi
  4. proslijedio/la je Tweet
    4. velj

    Root cause analysis and exploit for a Windows kernel ws2ifsl.sys use-after-free vulnerability.

    Poništi
  5. 3. velj
    Poništi
  6. 3. velj
    Poništi
  7. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  8. proslijedio/la je Tweet
    2. velj

    I’ve just uploaded my Jailbreak for the iPad Pro (2017) to GitHub. Right now, SSH and Sileo can be installed. Due to lack of devices, I cannot currently implement support for other devices. Feel free to create PRs if you would like to help me!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    2. velj

    The ultimate test of your knowledge is your capacity to convey it to another.

    Poništi
  10. proslijedio/la je Tweet
    2. velj

    Pointer Compression in V8 and what it means for browser exploitation by

    Poništi
  11. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  12. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  13. proslijedio/la je Tweet
    30. sij

    Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  15. proslijedio/la je Tweet
    30. sij

    Feynman Lessons for Learning: 🧠 1) Understanding is more important than memorization! 2) Learn principles, not formulas. 3) Ask questions! 4) Read Books every day. 5) Teaching is a powerful tool to learning.

    Poništi
  16. proslijedio/la je Tweet
    29. sij

    HEVD Exploits – Windows 7 x86 Arbitrary Write

    Poništi
  17. proslijedio/la je Tweet
    30. sij

    this is a xnu kernel info leak bug poc ,the bug which I found one year ago. I tested on 10.14.5 and iOS 13.2 it seems patched recently I don't know the CVE id.

    Poništi
  18. proslijedio/la je Tweet
    30. sij

    A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is).

    Poništi
  19. proslijedio/la je Tweet
    28. sij

    OS hacking: Local root exploit via the QEMU graphics driver Let’s exploit a SerenityOS kernel driver bug to get a root shell, and then fix the bug! 🐞🛠😎

    Poništi
  20. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  21. 28. sij

    Discounted prices are available. Check them out!!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·