kost

@k0st

Security/Hack. FLOSS security software contributor.

Vrijeme pridruživanja: svibanj 2008.

Tweetovi

Blokirali ste korisnika/cu @k0st

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @k0st

  1. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  2. proslijedio/la je Tweet
    prije 22 sata

    This is an excellent example of finding what is being measured and figuring out how to impact those variables to produce a desired outcome. Hacking 101

    Poništi
  3. proslijedio/la je Tweet

    PCFG Cracker - Probabilistic Context Free Grammar (PCFG) Password Guess Generator

    Poništi
  4. proslijedio/la je Tweet
    prije 23 sata

    Performance artist generates virtual traffic jams in Google Maps by pulling a wagon full of smartphones

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    Say hello to OpenSK: a fully open-source security key implementation

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by You can find it here:

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    Buffer overflow in sudo versions 1.7.1 - 1.8.25p1 when pwfeedback is set in sudoers

    Poništi
  8. proslijedio/la je Tweet
    2. velj
    Poništi
  9. proslijedio/la je Tweet
    2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  10. proslijedio/la je Tweet
    1. velj

    Windows 10 UAC bypass for all executable files which are autoelevate true.

    Poništi
  11. proslijedio/la je Tweet
    1. velj

    Java jdbc (deserialization) vulnerability automated exploitation

    Poništi
  12. proslijedio/la je Tweet
    1. velj
    Poništi
  13. proslijedio/la je Tweet
    1. velj

    Monday we will release DOMPurify 2.0.8 to fix a problem with SAFE_FOR_JQUERY and jQuery 3.x. If you don't use the SAFE_FOR_JQUERY combined with jQuery 3.x all is fine. If you do, please upgrade. 🙇‍♀️

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    1. velj

    For those of you using a NV GPU with Volta or Turing chipset, listen up! We hacked our way into the post-48k GPU shared memory region. This improved bcrypt cracking performance by an average of 25%. For instance a GTX2080Ti improved from 42116 H/s to 54770 H/s

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    New trick from EMARD loading overlay

    Poništi
  16. proslijedio/la je Tweet
    1. velj

    If you need a name for a new malware, threat group operation or hack tool, check this Imgur gallery with 29 posters showing deities, monsters and heroes of different mythologies

    Poništi
  17. proslijedio/la je Tweet
    1. velj

    I’ve been signing credit card slips with MASH characters names for years and no one has ever said anything about it

    Poništi
  18. proslijedio/la je Tweet
    31. sij

    Happy Friday hackers! Nitesh found a critical RCE vulnerability in Jenkins that led us to discover a Bitcoin mining service running on a DoD website 😲. Head over to the disclosed report to see all the details! Thanks for being 🔥 Nitesh

    Poništi
  19. proslijedio/la je Tweet
    1. velj
    Poništi
  20. proslijedio/la je Tweet
    31. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·