-
Awesome resources for pwners https://rmusser.net/docs/Exploit%20Development.html …
#exploitdev#pwn -
Began curating a list of Hyper-V exploitation resources, hope it can be of use to anyone interested in starting Hyper-V security research: https://github.com/shogunlab/awesome-hyper-v-exploitation …
#ExploitDev#HyperV pic.twitter.com/fS6jAmajin
-
7-Zip: From Uninitialized Memory to Remote Code Execution
#infosec#pentest#bugbounty#exploitDev https://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/ … -
Spread the word! Registrations for classes at
@brucon spring and@hackinparis are now open! Check our schedules page for info: https://www.corelan-training.com/index.php/training-schedules …#signupnow#educationispower#gettrained#windows#exploitdev#corelan#bootcamp#advanced -
Offensive Security Certified Expert && me
#infosec#pentest#exploitDev#OSCE https://hansesecure.de/2018/02/offensive-security-certified-expert-me/ …pic.twitter.com/9jUwg8Mk25
-
If you want to learn more about using shellcode and
#exploitdev techniques, check out these@elearnsecurity training courses
#ehnet pic.twitter.com/nZgL08NaG2
-
Day 1/60 Modul 1: finished - discovered a new tool (not burp suite
) && really looking forward to the next Modul and first #exploitDev stuff
#infosec#AWAE#tryharderpic.twitter.com/naGmzv1wKH
-
Happy to host
@corelanc0d3r and@corelanconsult for the#Advanced Training Course in Athens.#exploitdev#Pentesting#twelvesecpic.twitter.com/3Avefb1jwa
-
Interactive shellcoding environment to easily craft shellcodes
#infosec#pentest#exploitDev https://github.com/merrychap/shellen …pic.twitter.com/rNdGawNVcB -
CTF framework and exploit development library
#infosec#pentest#exploitDev https://github.com/Gallopsled/pwntools … -
PEDA - Python Exploit Development Assistance for GDB
#infosec#pentest#exploitDev https://github.com/longld/peda pic.twitter.com/8bG3raKrrk -
Master
#Linux exploitation with@hahnakane and Max Kamper at#Ringzer0. Upgrade your#exploitdev skills from#32bit to#64bit and learn modern#heap exploitation. Take both trainings back-to-back: http://bit.ly/ringzero-linuxexploitation …
http://bit.ly/ringzero-heapexploitation … pic.twitter.com/BkK5H38xdr
-
Exploit bugs in
#Chrome &#Safari at#Ringzer0 when you sign up for Advanced#Browser Exploitation by@itszn13 of@ret2systems. Upgrade your#exploitdev skills and master modern#JavaScript exploitation techniques.
Up to 25% OFF before Dec 31: http://bit.ly/ringzero-browsers … pic.twitter.com/Vb3cckT60Q
-
Black Friday Sale: If you are thinking to take the Advanced Software Exploitation course, now it's the time!! Get 20% off the ASE course with the discount code BLACKFRIDAY2019. https://www.psec-courses.com/courses/advanced-software-exploitation …
#ExploitDev#Vulnerabilities#Exploit#Pentesting#Hacking#Infosec pic.twitter.com/tovS84vcBu
-
Adobe Acrobat Reader DC text field value remote code execution vulnerability redux https://talosintelligence.com/vulnerability_reports/TALOS-2019-0860 …
#Vulnerability#ExploitDev#AdobeReader#CyberSecurity#Infosecpic.twitter.com/WhIjM4NRJ7
-
TIL writing
#XSS exploit (#exploitdev) is a lot easier when you don't use regexes and use `new DOMParser().parseFromString(xhttp.response, "text/html");` instead! xhttp here is the xmlhttprequest response. -
Backdooring PE-File (with ASLR)
#infosec#pentest#exploitDev https://hansesecure.de/backdooring-pe-file-with-aslr/ …pic.twitter.com/h6YRQd3X3B
-
Done with
@corelanc0d3r's@corelanconsult exploit development adanced training. This one besides@offsectraining's are really the best out there. Now it's all practice practice practice.#exploit#ExploitDev pic.twitter.com/z83I8ISrb3 -
All of the props this week to
@jgeigerm for an amazing job teaching SANS SEC760. Very excited to have him on board. He’s also gonna take over some authorship for me! Good things to come.#ExploitDev -
A curated list of fuzzing resources ( Books, courses - free & paid, videos, tools, tutorials & vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
#infosec#pentest#exploitDev https://github.com/secfigo/Awesome-Fuzzing …pic.twitter.com/1hXzLC3rEC
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.