-
First ARM shellcode written during
@Fox0x01 's ARM exploitation lab in#HITB2019AMS and I'm like ... Awesome track! pic.twitter.com/VU0sGxwUNc -
Badge solved? I got 4 secret codes and some special modes :) pic.twitter.com/V8TqsNf9D9
#HITB2019AMS -
-
Say hi, hack cars.
@HITBSecConf#HITB2019AMS pic.twitter.com/qzd9Jrs8DD
-
And
#HITB2019AMS is over... Great organisation, great people, great party
It was nice to see those with familiar faces again and meet the new ones to remember
Until next year!
pic.twitter.com/0HoOOQP4xH
-
Running a Bluetooth LE MITM attack at the
#HITB2019AMS training and it’s working out of the box. Wow.
Thanks @slawekja for this gorgeous preparation!pic.twitter.com/b6MsA0d6QP
-
Day 2 IoT village with
@aseemjakhar@virtualabs#HITB2019AMS cc@expliot_io@HITBSecConfpic.twitter.com/q6udz55s7y
-
Finally done with em locks! Are you ready for us at HITB ?
#HITB2019AMS pic.twitter.com/9JvR1XD8gV -
"Overcoming Fear: Reversing With Radare2" http://bit.ly/313IO1t (Open Your Hex -
#HITB2019AMS) -
Should we load
@bettercap here?#HITB2019AMS pic.twitter.com/A9Je8nmows
-
last week I attended
#HITB2019AMS for the first time. It was an amazing opportunity for me, I met interesting people, learned some new stuff, soldering,#IoT security issues and all the things that could be hacked today. Already waiting for my next time. Maybe#hardwear_io US?!pic.twitter.com/6HOCLcRwKt
-
Just uploaded the exploit for my
#HITB2019Ams talk, kernel privilege escalation on macOS High Sierra without memory corruption: https://github.com/ChiChou/sploits/tree/master/ModJack … slides: https://conference.hitb.org/hitbsecconf2019ams/materials/D2T2%20-%20ModJack%20-%20Hijacking%20the%20MacOS%20Kernel%20-%20Zhi%20Zhou.pdf …pic.twitter.com/gO6O6KHebz
Prikaži ovu nit -
#HITB2019AMS was amazing, thank you@l33tdawg and team for giving me the opportunity to attend this conference! -
Being part of Hack in the Box conference is amazing!
#HITB@HITBSecConf#HITBSecConf2019#HITB2019AMS pic.twitter.com/LgdeaVeA9IOvo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
-
Lunch with hackerettes!

@0xdr3a and@StChantal,@pinkflawd, and the awesome@hardwear_io ladies!
#HITB2019AMS pic.twitter.com/30jvfMU1EV
-
@aseemjakhar explaining smart device vulnerabilities to smart kids ;)#HITB2019AMS cc@expliot_io@HITBSecConfpic.twitter.com/0f1B8Vpxfb
-
I've added a few more features for my MachO binary search engine. Get ready for
#HITB2019AMS pic.twitter.com/0t9RX72W3h
Prikaži ovu nit -
Updating Ken Thompson's "Trusting Trust" for modern compilers.
@pinkflawd at#HITB2019AMS pic.twitter.com/GSWdODZfZN
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.