-
Awesome resources for pwners https://rmusser.net/docs/Exploit%20Development.html …
#exploitdev#pwn -
Began curating a list of Hyper-V exploitation resources, hope it can be of use to anyone interested in starting Hyper-V security research: https://github.com/shogunlab/awesome-hyper-v-exploitation …
#ExploitDev#HyperV pic.twitter.com/fS6jAmajin
-
CTF framework and exploit development library
#infosec#pentest#exploitDev https://github.com/Gallopsled/pwntools … -
Backdooring PE-File (with ASLR)
#infosec#pentest#exploitDev https://hansesecure.de/backdooring-pe-file-with-aslr/ …pic.twitter.com/h6YRQd3X3B
-
Doing exploitDev for x86? Check this repo #1 skeleton Exploits #2 eggHunter shellcodes #3 fancy wrapper for Spike (writeUp: https://hansesecure.de/howto-exploitdev-fuzzing/ …)
#infosec#pentest#exploitDev#exploit https://github.com/HanseSecure/ExploitDev …pic.twitter.com/OfG8Jpiy4i
-
A curated list of fuzzing resources ( Books, courses - free & paid, videos, tools, tutorials & vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
#infosec#pentest#exploitDev https://github.com/secfigo/Awesome-Fuzzing …pic.twitter.com/1hXzLC3rEC -
Interactive shellcoding environment to easily craft shellcodes
#infosec#pentest#exploitDev https://github.com/merrychap/shellen …pic.twitter.com/rNdGawNVcB -
Black Friday Sale: If you are thinking to take the Advanced Software Exploitation course, now it's the time!! Get 20% off the ASE course with the discount code BLACKFRIDAY2019. https://www.psec-courses.com/courses/advanced-software-exploitation …
#ExploitDev#Vulnerabilities#Exploit#Pentesting#Hacking#Infosec pic.twitter.com/tovS84vcBu
-
Really enjoyed reading
@va_start's blog post. If you are interested in vulnerability research this is a great read for finding your first bug. Also refreshing from all the web stuff out there! https://blog.vastart.dev/2019/06/cve-2019-12181-serv-u-exploit-writeup.html …#Pentest#hacking#exploitdev -
Wanna learn to ROP in Linux? Check it out: https://blog.hyperiongray.com/pwning-dnsmasq-with-rop/ …
#exploit#exploitdev -
Master
#Linux exploitation with@hahnakane and Max Kamper at#Ringzer0. Upgrade your#exploitdev skills from#32bit to#64bit and learn modern#heap exploitation. Take both trainings back-to-back: http://bit.ly/ringzero-linuxexploitation …
http://bit.ly/ringzero-heapexploitation … pic.twitter.com/BkK5H38xdr
-
#whoishiring#exploitdeveloper#0dayresearcher#penetrationtester - Working with a very talented individual who is OSCP, OSCE, OSWE cert with multiple registered CVE's looking to do more#0dayresearch and#exploitdev in next role. Anyone looking in Dallas for someone like this? -
Hunting For Bugs With AFL 101 - A PRIMER
#infosec#pentest#exploitDev#bugbountyhttps://research.aurainfosec.io/hunting-for-bugs-101/ … -
7-Zip: From Uninitialized Memory to Remote Code Execution
#infosec#pentest#bugbounty#exploitDev https://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/ … -
Spread the word! Registrations for classes at
@brucon spring and@hackinparis are now open! Check our schedules page for info: https://www.corelan-training.com/index.php/training-schedules …#signupnow#educationispower#gettrained#windows#exploitdev#corelan#bootcamp#advanced -
Offensive Security Certified Expert && me
#infosec#pentest#exploitDev#OSCE https://hansesecure.de/2018/02/offensive-security-certified-expert-me/ …pic.twitter.com/9jUwg8Mk25
-
If you want to learn more about using shellcode and
#exploitdev techniques, check out these@elearnsecurity training courses
#ehnet pic.twitter.com/nZgL08NaG2
-
Happy to host
@corelanc0d3r and@corelanconsult for the#Advanced Training Course in Athens.#exploitdev#Pentesting#twelvesecpic.twitter.com/3Avefb1jwa
-
PEDA - Python Exploit Development Assistance for GDB
#infosec#pentest#exploitDev https://github.com/longld/peda pic.twitter.com/8bG3raKrrk
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.