Rezultati pretraživanja
  1. 7. stu 2019.

    While it didn’t rain inside I did get to attend @

  2. 10. stu 2019.

    It is raining heavily in Seoul after .

  3. 7. stu 2019.
    Prikaži ovu nit
  4. 1. stu 2019.

    One of ’s plans in (Nov. 7~8) is to release a forever jailbreak. I hope his plan will go well.

  5. 1. stu 2019.

    In a few days I will be talking about checkm8 and checkra1n in Seoul at my talk “The One Weird Trick SecureROM Hates”.

  6. 1. stu 2019.

    At , Xpl017Elz will give the second round of “New Reliable Android Kernel Root Exploitation”(first round at POC2016). He will talk about bypassing attack against KASLR, PXN, RKP, JOPP, EPV, etc. If you are interested in making a fullchain in Android, come to .

  7. 8. stu 2019.

    It’s not a real conference if the monitors in the venue’s lobby aren’t showing blue screens by the end

  8. 14. stu 2019.

    Here are my slides from about exploiting CVE-2018-8611: Super fun bug to exploit imo. Most common question was if the inc primitive is really practical. The answer is yes. Use a series of 8 single byte increments at different addr alignments.

    Prikaži ovu nit
  9. 8. stu 2019.

    Fuxking hot noodle challenge in Korea 😆

  10. 7. stu 2019.

    There are been some questions about my Hyper-V slides so they are now up at NB: POC will release all the slides in a week or so also. Certainly take a look of all of them - 1st day already had very good ones :)

  11. 6. stu 2019.

    Done with our training , now it’s time for some lit talks 🔥

  12. [POCWEEK] Trainer, Prateek and Denish with Offensive mobile reversing and exploitation!

  13. 3. stu 2019.

    Beginning of . Dinner with trainers.

  14. 8. stu 2019.

    Luca Todesco () giving his talk "The One Weird Trick SecureROM Hates” at in Seoul.

  15. Lets head out for 2nd day!

  16. 7. stu 2019.
  17. 8. stu 2019.

    Looks like and are lost in translation 🤔 is over, enjoy your stay in Seoul!

  18. 3. stu 2019.
  19. 2. stu 2019.

    Windows kernel sandbox escape (not in win32k). One bug to rule Windows 10 1809. Race condition -> Use-after-free -> Memory disclosure -> Increment primitive -> Arbitrary read -> Arbitrary write -> Privilege escalation. Come see amazing present our work at

  20. Last talk for the ! James is going to present ‘Reimplementing Local RPC .NET and also at the end he’s dropping UAC bypass technique

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.