Tweetovi

Blokirali ste korisnika/cu @LiveOverflow

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @LiveOverflow

  1. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Getting started with cryptographic protocol analysis is now easier than ever! Check out our new 17-minute video tutorial, now on YouTube – it covers Verifpal’s language, how to use Verifpal to verify post-compromise secrecy in Signal, and more:

    Poništi
  3. 30. sij

    The epidemic will get the travel influencers first. Then come the daily vloggers who walk around outside too much. And the last content to die out will be the gamers on Twitch. Sitting 24/7 infront of the PC doesn't seem so bad anymore!

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    Excited to start the new year with CVE-2020-3842 :) It's a fun one and unlike the other bugs I reported so far so I'm looking forward to (responsibly) disclosing it.

    Poništi
  5. proslijedio/la je Tweet
    29. sij

    Paper Review S01E02 - CacheOut! EU friendly steam, starting in 15 min!

    Poništi
  6. 26. sij
    Poništi
  7. proslijedio/la je Tweet
    24. sij

    Nintendo apparently forgot to enable compiler optimizations in Super Mario 64. Also, people of course decompiled it...

    Poništi
  8. 21. sij

    Just clicking through the submissions. This one is also awesome

    Prikaži ovu nit
    Poništi
  9. 21. sij
    Prikaži ovu nit
    Poništi
  10. 21. sij
    Prikaži ovu nit
    Poništi
  11. 21. sij

    A game jam by just finished about creating a game where intentional bugs and glitches are the main game mechanic! There are some really creative games! here are the entries:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    19. sij

    Solutions to the challenge `WW3` on Any bugs/typos, lemme know :)

    Poništi
  13. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  14. 18. sij

    A video of mine using z3 for a CTF challenge

    Prikaži ovu nit
    Poništi
  15. 18. sij

    z3 is a tool we see used in CTFs and and generally reverse engineering. But I just stumbled over this gamedev talk where used z3 to find bugs in the decision/dialogue trees of a game. And even generates valid savegame states with it!!!

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    17. sij

    I just published a video explaining the details of CVE-2020-0601 aka Curveball: The Microsoft CryptoAPI vulnerability that was reported by the NSA.

    Poništi
  17. 17. sij

    I clicked on this video because of clickbait, and it turned out to contain actual great advice!

    Poništi
  18. proslijedio/la je Tweet
    16. sij

    Zelda OOT speedruns in 2020: "yeah we just manipulate the heap by lifting rocks to exploit a use-after-free and rewrite a function pointer to jump into a multi stage payload involving Link's name and the buttons pressed on controllers 1 and 3"

    Poništi
  19. proslijedio/la je Tweet
    11. sij

    My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.

    Prikaži ovu nit
    Poništi
  20. 14. sij

    AI is the future

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·