Tweetovi

Blokirali ste korisnika/cu @insecur1tea

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @insecur1tea

  1. proslijedio/la je Tweet

    Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from 2019:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  3. proslijedio/la je Tweet

    [CPR-Zero] CVE-2019-1372 (Azure App Service): Heap Based Buffer-Overflow in DWASInterop.dll

    Poništi
  4. proslijedio/la je Tweet

    [CPR-Zero] CVE-2019-1234 (Azure Stack): Azure Stack Spoofing Vulnerability

    Poništi
  5. proslijedio/la je Tweet
    3. velj

    We just released KotlinScriptProvider, an extension that allows running Kotlin scripts in Ghidra.

    Poništi
  6. proslijedio/la je Tweet
    Poništi
  7. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  8. proslijedio/la je Tweet
    2. velj
    Poništi
  9. proslijedio/la je Tweet
    1. velj

    New video! What's the CPU stack used for and how does it work? Check it out:

    Poništi
  10. proslijedio/la je Tweet
    31. sij

    Reversing XignCode3 Anticheat – Registering Notify and Callback Routines Part 4.1 is out! 🤯 Anti-cheats use callbacks and notification routines to control what is happening on your system, let's dig into this

    Poništi
  11. proslijedio/la je Tweet
    31. sij

    My student Denis wrote a formal semantics for the French tax code, complete with Coq proof of soundness and SMT queries to uncover unfair tax hikes. PL for fiscal justice!

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    31. sij
    Poništi
  13. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  14. proslijedio/la je Tweet
    31. sij
    Poništi
  15. proslijedio/la je Tweet
    31. sij
    Poništi
  16. proslijedio/la je Tweet
    30. sij

    Google loves security keys, and today announced an open source implementation to help spur further innovation from the security research community 1/ .

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    30. sij

    HWASAN (think of it as ASAN v2) has become available to developers on Android outside of Google. If you use C or C++ on Android, please give it a try. HWASAN is also available on Aarch64 Linux with a recent kernel.

    Poništi
  18. proslijedio/la je Tweet
    30. sij

    Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!

    Poništi
  19. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  20. proslijedio/la je Tweet
    30. sij

    For the past few months, I've been diving into Apple's Endpoint Security Framework. This post shares how I use the framework for detection engineering purposes.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·