m4d0u1

@m4d0u1

Interested in InfoSec (the ethical side) / malware reversing / pentesting / red / blue teams

Algeria
Vrijeme pridruživanja: lipanj 2010.

Tweetovi

Blokirali ste korisnika/cu @m4d0u1

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @m4d0u1

  1. proslijedio/la je Tweet
    4. velj

    MobOk : A malware family in constant evolution 📈 This apps will charge €4.99 a week via your mobile contract 🤑 Found in 49 applications, 9 of which are still on the Play Store 👀

    Poništi
  2. proslijedio/la je Tweet
    2. velj
    Poništi
  3. proslijedio/la je Tweet
    1. velj

    Cutter v1.10.1 released! 🥳 Tomorrow, GitHub will capture and store every repository in an archival facility deep in an Arctic mountain. 🥶🗻 Today, we release a special edition for the benefit of future mankind and other beings 👽 Get it @ Highlights >>

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    27. sij
    Poništi
  5. proslijedio/la je Tweet
    28. sij

    Here's my PoC for CVE-2020-7980, a script to gain RCE (root level) to some Satellite controllers.

    Prikaži ovu nit
    Poništi
  6. 28. sij

    False positive with regarding the exe is not signed at all, how it's identified as CVE-2020-0601? cc:

    Poništi
  7. proslijedio/la je Tweet
    27. sij

    due to a small issue, the scores of were not visible anymore during a few days! The feature is now working again as expected in . Thx to

    Poništi
  8. proslijedio/la je Tweet
    27. sij

    We've added 11 new XSS labs, with learning materials. There is new content on CSP, dangling markup injection, and escaping the AngularJS sandbox.

    Poništi
  9. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  10. 26. sij
    Poništi
  11. 26. sij
    Poništi
  12. proslijedio/la je Tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi
  13. proslijedio/la je Tweet
    20. sij

    Open sourced a bit of automation around unpacking apps using devices;

    Poništi
  14. proslijedio/la je Tweet
    23. sij

    PoC (Denial-of-Service) for CVE-2020-0609 & CVE-2020-0610 Please use for research and educational purpose only.

    Poništi
  15. proslijedio/la je Tweet
    23. sij

    r2frida 4.2 is out! You can now use breakpoints and eternalize scripts in ! /cc

    Poništi
  16. proslijedio/la je Tweet
    24. sij

    It's time to drop my DoS PoC for CVE-2020-0609 & CVE-2020-0610! Gonna make the scanner soon and then hopefully create a full RCE if possible :) Thanks to for the assistance!

    Poništi
  17. proslijedio/la je Tweet

    Salut Twitter ! Je ne poste plus beaucoup ici, mais y a-t-il parmi vous des experts de Locky, familiers de son fonctionnement et des dégâts qu'il a causé en France ? Je dispose de tous les moyens modernes de communication, notamment des DM ouverts.

    Poništi
  18. proslijedio/la je Tweet
    23. sij

    The Bezos forensic report is not very good. The forensic analysis should be done by who at least have the relevant experience. The MP4 file should contain the exploit (if it is CVE-2019-11931). The exploit trigger should be visible with ffmpeg

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    23. sij

    Extremely thrilled to launch today. Thanks for everyone supporting this initiative. Together we will 👊

    Poništi
  20. 24. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·