-
#Phrack 67 Released http://phrack.com/ -
-
#dyingwhalenoises#phrack (THEY DON'T EVEN KISS, HERE. HOW DO THEY NOT EVEN KISS FOR SO MANY EPISODES I CANNOT EVEN) pic.twitter.com/q2JfuzOS0DPrikaži ovu nit -
2005, Phrack #63 is released at WTH. It marks the end of teso/thc/hert managing Phrack. Just decided to publish the original PDF. Enjoy the magazine! Keep Hacking!
#phrack https://upload.wikimedia.org/wikipedia/commons/1/19/Phrack_63_Hardcover.pdf …pic.twitter.com/iHfNz8mjJ1
-
No netcat/telnet/bash/python/ruby/php on board when rev|bind shell is needed? Some good old and updated gawk remote shellz with
#Phrack, and@thegrugq in the context. https://blog.sektor7.net/#!res/2019/gawk-shellz.md …pic.twitter.com/lqfmln8udX
-
Oh, a new
#Phrack paper is out: (De)coding an iOS Kernel Vulnerability (CVE-2018-4109), by@doadam
http://phrack.org/papers/viewer_discretion_advised.html … #iOS#vulnerability -
Twenty years of Escaping the Java Sandbox : http://phrack.org/papers/escaping_the_java_sandbox.html …
#phrack -
New
#Phrack paper: .NET Instrumentation via MSIL bytecode injection http://phrack.org/papers/dotnet_instrumentation.html …pic.twitter.com/YCgZXtTkBq
-
Attacking JavaScript Engines : A case study of JavaScriptCore and CVE-2016-4622 : https://www.exploit-db.com/papers/42881/
#phrack -
VM Escape - QEMU Case Study - CVE-2015-5165 (a memory-leak vulnerability) and CVE-2015-7504 : http://www.phrack.org/papers/vm-escape-qemu-case-study.html …
#phrack -
New
#Phrack paper feed: "VM escape - QEMU Case Study" by Mehdi Talbi & Paul Fariello: http://www.phrack.org/papers/vm-escape-qemu-case-study.html … -
My paper on vm escape co-authored with my friend
@paulfariello is out in#phrack http://www.phrack.org/papers/vm-escape-qemu-case-study.html … -
Curious about the
@mechanicalphish? Our#Phrack article just went live! http://phrack.org/papers/cyber_grand_shellphish.html … -
I am starting to believe that
#Phrack is a projection of some timeless entity, keeping standards since antiquity as if no drama ever existed -
So here's my writeup for CVE-2016-4622: http://www.phrack.org/papers/attacking_javascript_engines.html … enjoy!
#phrack -
"Smashing the stack for fun and profit" anniversary (
#Phrack 11 Aug 1996); jmp offset-to-call; pop ...; call offset-to-pop; "/bin/sh" -
-
#Phrack history: 15 years ago, Team TESO et al publish the 1st European issue (57) at HAL 2001 (also in hardcopy)! pic.twitter.com/BDMBTPA5Ry
-
#Phrack prophile on the legendary@solardiz! http://phrack.org/issues/69/2.html#article … Preparing for our talk at HAL 2001...#w00w00 pic.twitter.com/47PkqCxFvx
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.