l42Y_

@l42Y_

Eternal n00b | OSCP

Vrijeme pridruživanja: siječanj 2011.

Tweetovi

Blokirali ste korisnika/cu @l42Y_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @l42Y_

  1. proslijedio/la je Tweet
    12. ožu 2016.

    There are 10 kinds of infosec people

    Poništi
  2. proslijedio/la je Tweet
    5. velj

    The problem as a researcher with building course content is that you want to go down every rabbit hole you identify as you're writing the content. So. Much. Attack. Surface.

    Poništi
  3. proslijedio/la je Tweet
    6. velj

    CVE-2019-1388 Microsoft Windows UAC Privilege Escalation Exploit Tool : HHUPD.exe () Ref :

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  4. proslijedio/la je Tweet

    Also coming soon: Process Explorer dark mode

    Poništi
  5. proslijedio/la je Tweet

    VSCode x * VSCode based GUI * Interactive terminal * Remote file browser (Yes!) * Open source Not on market yet. But you can built it from the source:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    3. velj

    Injectus - CRLF And Open Redirect Fuzzer

    Poništi
  7. proslijedio/la je Tweet
    26. sij
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    2. velj

    The ultimate test of your knowledge is your capacity to convey it to another.

    Poništi
  9. proslijedio/la je Tweet
    1. velj
    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  11. proslijedio/la je Tweet
    2. velj

    See-SURF - Python Based Scanner To Find Potential SSRF Parameters

    Poništi
  12. proslijedio/la je Tweet
    2. velj
    Poništi
  13. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  14. proslijedio/la je Tweet
    1. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  15. proslijedio/la je Tweet
    31. sij

    Some reading for the weekend 😉

    Poništi
  16. proslijedio/la je Tweet
    29. sij

    How to use the Fuzz tool WinAFL—fuzzing the FreeImage image analysis library #

    Poništi
  17. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  18. proslijedio/la je Tweet
    29. sij

    Interesting vulnerability: may_create_in_sticky() was done when we already have dropped the ref to dir and thus dir (a struct dentry ptr) might be freed and reuse. One impact is a 1-bit infoleak oracle in open() (CVE-2020-8428)

    Poništi
  19. proslijedio/la je Tweet
    27. sij

    Interested in learning Windows Kernel exploitation ? wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.

    Poništi
  20. proslijedio/la je Tweet
    27. sij

    macOS/iOS: ImageIO: heap corruption when processing malformed TIFF image

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·