Tweetovi

Blokirali ste korisnika/cu @honorary_bot

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @honorary_bot

  1. proslijedio/la je Tweet
    17. sij

    I clicked this link in this clickbaity tweet, and it IS a great advice :)

    Poništi
  2. proslijedio/la je Tweet
    13. stu 2019.

    We've just updated our presentations repo () to include the slides for the three talks of our team members and at

    Poništi
  3. 23. ruj 2019.

    Explored all of the possible wrong ways in the last challenge. But still gg!

    Poništi
  4. proslijedio/la je Tweet
    17. ruj 2019.

    We've just released the code for the WinDBG Plugin by our team member Artem Shishkin () presented at ()

    Poništi
  5. proslijedio/la je Tweet
    23. kol 2019.

    New paper - "Randpoline: A Software Mitigation for Branch Target Injection" Thanks for the help in reviewing and amazing discussions

    Poništi
  6. proslijedio/la je Tweet
    16. kol 2019.

    Well, read the thread and you will know what we try to do! I agree with everything in it!

    Poništi
  7. proslijedio/la je Tweet
    13. kol 2019.
    Odgovor korisniku/ci

    No PE or DWARF but here's a prime that is an ELF file :) 0x7f454c46010101000000000000000000020003000100000054800408340000000000000000000000340020000100000000000000010000000000000000800408008004085b0000005b0000000500000000100000b32a31c040cd80597ec9b11d

    Poništi
  8. proslijedio/la je Tweet
    24. lis 2018.

    Visited base today with and . Friendly soldiers explained a lot to us. Proud of being Brazilian and having such an eleet police force

    Poništi
  9. 16. ruj 2018.

    We used to play UT99 in a computer club with friends in my childhood. Since I was bad at the game, they just called me a bot. Honorary bot.

    Poništi
  10. 6. svi 2018.

    Check out this cool geometry puzzles from a friend of mine

    Poništi
  11. proslijedio/la je Tweet
    7. tra 2018.

    Obtaining unexported function addresses using exceptions

    Poništi
  12. proslijedio/la je Tweet
    4. tra 2018.

    I've created a Linux Kernel Defence Map showing the relations between: - vulnerability classes / exploitation techniques, - kernel defences, - bug detection means. Feedback is welcome. Link:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    Interesting thing. An application ran by admin hasn't shadow against meltdown vulnerability.

    Poništi
  14. proslijedio/la je Tweet
    28. ožu 2018.
    Prikaži ovu nit
    Poništi
  15. 23. ožu 2018.

    Released an initial version of SDK for PulseDbg Who knows, might be useful for you ;)

    Poništi
  16. proslijedio/la je Tweet
    23. ožu 2018.

    Some information about Intel ME cryptography implementation [rus].

    Poništi
  17. proslijedio/la je Tweet
    22. velj 2018.
    Poništi
  18. proslijedio/la je Tweet
    20. velj 2018.

    Look, STACKLEAK blocks the recent CVE-2017-17712 exploit against : The uninitialized stack pointer is set to STACKLEAK_POISON (-0xBEEF). That blocks the stack spraying needed for a local privilege escalation.

    Poništi
  19. proslijedio/la je Tweet
    13. velj 2018.

    new blog post [Technical]:"In debt to retpoline".

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    30. sij 2018.

    Quarterly reminder: I am always looking for contract and/or fully remote work related to SRE/DevOps, embedded systems, security and all other kinds of (reverse) engineering. Looking for someone with my odd skillset? Know someone who does? Get in touch! DM or mailto:q3k@q3k.org.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·