-
Slides for
@ms_s3c and my talk on fuzzing at#BHEU are now available: https://hexgolems.com/2019/12/hotfuzz/ … -
My final presentation of HTTP Desync Attacks will be at Black Hat Europe next week. New content includes a novel desync technique, major automation improvements, a defensive case-study, and updated bounty figures
#BHEU https://www.blackhat.com/eu-19/briefings/schedule/#http-desync-attacks-request-smuggling-reborn-18313 … -
Can't wait to present the progress we've made since
#BHEU at@offensive_con! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.#offensiveconpic.twitter.com/xfEaCdgraH
-
The recording of my talk "Unveiling the Underground World of Anti-Cheats" at BlackHat Europe 2019 is now online! :D A pleasure to be part of
@BlackHatEvents !! https://www.youtube.com/watch?v=yJHyHU5UjTg …#BHEU#security#infosecPrikaži ovu nit -
Five
#BHEU Briefings recordings are now available on the#BlackHat YouTube Channel. Watch them here:http://ow.ly/501R50xJcQt -
My
@BlackHatEvents slides on "Unveiling the Underground Word of Anti-Cheats" are now available on the@Immunityinc site. You can find additional information about bypasses to multiple Anticheats (new info at the end) https://immunityinc.com/resources/papers-presentations.html …#reversing#security#BHEU#Blackhatpic.twitter.com/PgsluKijFE
-
Slides and material from our talk on attacking container build systems from
#BHEU are now online: https://github.com/heroku/bheu19-attacking-cloud-builds … And so is Terrier, the CI-oriented container integrity verification tool (mainly due to the amazing effort of the@brompwnie):https://github.com/heroku/terrier/ -
Thanks to all of the
#BHEU 2019 Arsenal Presenters, Attendees and of course the@ToolsWatch Team for a great showing of open-source tools!https://twitter.com/ToolsWatch/status/1202629316737208320 …
-
Ok folks that's a wrap !!!! Thanks everyone for making this
#BHEU Arsenal London 2019 an awesome place to catch up with old and new friends from all over the world !! Hugs to@Jasminanicolee Steve Rich and@BlackHatEvents ... Special hugs to our beloved chairhacker@MadelineS_Mpic.twitter.com/XIGgArXX1n
-
للتو انتهيت من عرض أداة برق بنجاح في مؤتمر بلاكهات لندن بحمدالله. Just finished presenting barq in
#BHEU Arsenal. Barq is the AWS post exploitation attack tool. Find it here: https://github.com/Voulnet/barq@ToolsWatch pic.twitter.com/HCYoMr1eUV
-
Final slides of my presentation yesterday at Black Hat Europe 2019, about malicious VBA macros and recent advances in the attack & defence sides: https://www.decalage.info/bheu2019 Featuring
#oletools/olevba, ViperMonkey, MacroRaptor, EvilClippy#BHEU#BHEU2019pic.twitter.com/iT8iqvIM8E
-
Ok ze little french car in ze box is all ready for
@BlackHatEvents attendees to come and hack. Briefings attendee lounge on the 3rd at 10:25am. We've got CAN devices to hand out and lots to play with#carhacking#BHEU pic.twitter.com/2G6mds4wU4
-
It was an honor to present our research at
#BHEU. Thanks everyone for attending. It was a pleasure to see the interest of the community and we promise to keep the progress going. For everyone who missed the talk: https://alephsecurity.com/2019/06/25/xnu-qemu-arm64-2/ …pic.twitter.com/r3UiYi5QMr
-
Interesting presentation on fuzzing at scale with Google’s ClusterFuzz
#BHEU pic.twitter.com/wnhyEJ3G2T
-
Do you want to know how to use Windows Event Logs to improve your detection, matched to MITRE ATT&CK? Join my session at
@BlackHatEvents Arsenal station 6 at 3:45 p.m. and find out how my open source tool#EventList can help you!#BHEU pic.twitter.com/z7GM3MGOUT
-
Today
@ScepticCtf presented our work on Siemens S7-1200v4 bootloader reversing at#bheu. We will present more about Siemens ADONIS RTOS later this year at#36c3 and will present the most complete package including releasing the code for using the special access feature at#S4x20.pic.twitter.com/Q5E5ITLFfb
-
Next up... I want to be James Kettle
@albinowax when I grow up. He's singlehandedly made appsec sexy again after years of hardly any decent research. This little trick will make the bug bounty scene go mad.#BHEU pic.twitter.com/BxjEgKRDW7
Prikaži ovu nit -
Insights into the business of a new Android botnet called Geost.
@eldracote@anshirokova and@MaryJo_E revealing the secrets of a cybercrime group at#BlackHatEurope2019#BlackHat#BHEU pic.twitter.com/XaXKwWXS6q
-
I'm sure when I look back at Black Hat Europe 2019, one of my favorite moments will be "That time
@MalwareJake cosplayed as China."
#bheu#blackhatpic.twitter.com/yRqMPM9CpY
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.