Rezultati pretraživanja
  1. 5. pro 2019.

    Slides for and my talk on fuzzing at are now available:

  2. 27. stu 2019.

    My final presentation of HTTP Desync Attacks will be at Black Hat Europe next week. New content includes a novel desync technique, major automation improvements, a defensive case-study, and updated bounty figures

  3. 27. sij

    Can't wait to present the progress we've made since at ! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.

  4. 7. sij

    The recording of my talk "Unveiling the Underground World of Anti-Cheats" at BlackHat Europe 2019 is now online! :D A pleasure to be part of !!  

    Prikaži ovu nit
  5. 28. pro 2019.

    Five Briefings recordings are now available on the YouTube Channel. Watch them here:

  6. 20. pro 2019.

    My slides on "Unveiling the Underground Word of Anti-Cheats" are now available on the site. You can find additional information about bypasses to multiple Anticheats (new info at the end)

  7. 6. pro 2019.

    Slides and material from our talk on attacking container build systems from are now online: And so is Terrier, the CI-oriented container integrity verification tool (mainly due to the amazing effort of the ):

  8. 6. pro 2019.
  9. 5. pro 2019.

    Thanks to all of the 2019 Arsenal Presenters, Attendees and of course the Team for a great showing of open-source tools!

  10. Ok folks that's a wrap !!!! Thanks everyone for making this Arsenal London 2019 an awesome place to catch up with old and new friends from all over the world !! Hugs to Steve Rich and ... Special hugs to our beloved chairhacker

  11. 5. pro 2019.

    للتو انتهيت من عرض أداة برق بنجاح في مؤتمر بلاكهات لندن بحمدالله. Just finished presenting barq in Arsenal. Barq is the AWS post exploitation attack tool. Find it here:

  12. 5. pro 2019.

    Final slides of my presentation yesterday at Black Hat Europe 2019, about malicious VBA macros and recent advances in the attack & defence sides: Featuring /olevba, ViperMonkey, MacroRaptor, EvilClippy

  13. Ok ze little french car in ze box is all ready for attendees to come and hack. Briefings attendee lounge on the 3rd at 10:25am. We've got CAN devices to hand out and lots to play with

  14. 4. pro 2019.

    Interesting presentation on fuzzing at scale with Google’s ClusterFuzz

  15. 4. pro 2019.

    Do you want to know how to use Windows Event Logs to improve your detection, matched to MITRE ATT&CK? Join my session at Arsenal station 6 at 3:45 p.m. and find out how my open source tool can help you!

  16. 4. pro 2019.

    Today presented our work on Siemens S7-1200v4 bootloader reversing at . We will present more about Siemens ADONIS RTOS later this year at and will present the most complete package including releasing the code for using the special access feature at .

  17. Next up... I want to be James Kettle when I grow up. He's singlehandedly made appsec sexy again after years of hardly any decent research. This little trick will make the bug bounty scene go mad.

    Prikaži ovu nit
  18. 4. pro 2019.

    Insights into the business of a new Android botnet called Geost. and revealing the secrets of a cybercrime group at

  19. 4. pro 2019.

    I'm sure when I look back at Black Hat Europe 2019, one of my favorite moments will be "That time cosplayed as China." 😂

  20. TheTHE (The Thread Hunting Experience) es el nombre de la herramienta que presentan hoy , y en . ¿Quieres saber más? Lee nuestro post➡️ Info oficial del evento➡️

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.