Tweetovi

Blokirali ste korisnika/cu @makelariss

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @makelariss

  1. proslijedio/la je Tweet
    31. pro 2019.

    SerenityOS exploit analysis (CVE-2019-20172) Taking a deep look at the exploit, the bug and the fixes so far 🔎💥🐞

    Poništi
  2. proslijedio/la je Tweet
    15. sij

    Naughty kid! Your Christmas gift is made to fly, not to be torn apart!

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    This cheat sheet covers a set of secure coding guidelines to avoid in applications. These guidelines are essential for every React developer. Please share! Make sure you subscribe, so you receive updates and new cheat sheets!

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    2. velj

    This is what Tesla Autopilot sees using neural networks that take 70,000 GPU hours to train and output 1,000 tensors (predictions) at each timestep. Source:

    Poništi
  5. proslijedio/la je Tweet
    26. sij

    As I have no cool new findings, lets start the year with an old IE bug - bypassing Content-Disposition: attachment with mhtml:

    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers Hope you enjoy! As always ping me with any questions

    Poništi
  7. proslijedio/la je Tweet
    1. velj

    1st of the year! The community keeps growing, we keep sharing and providing an space for collaboration & discussions about Cybersecurity & Hacking

    Poništi
  8. proslijedio/la je Tweet
    1. velj

    Monday we will release DOMPurify 2.0.8 to fix a problem with SAFE_FOR_JQUERY and jQuery 3.x. If you don't use the SAFE_FOR_JQUERY combined with jQuery 3.x all is fine. If you do, please upgrade. 🙇‍♀️

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    31. sij
    Poništi
  10. proslijedio/la je Tweet
    24. lis 2019.

    hacklu ctf doyouevenxss exploit. says i solved some stages with unintended solution.. plz wait for official writeup!

    Poništi
  11. proslijedio/la je Tweet
    14. kol 2019.

    I uploaded the source code of our DEFCON 27 CTF exploit framework! Enjoy it. cc. , @aka_saika -- I made the front page a day before the CTF, please understand dirty codes ㅠ_ㅠ

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    28. sij

    Blog: Tracking : our analysis of sample configurations, ransom demands and sinkhole data. The REvil affiliates operate at a huge scale encrypting 1000s of systems at once. And we're only seeing a fraction of the total activity.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    30. sij

    My write-up on how I tracked down an alleged member of REvil group utilizing methods. If you enjoyed reading this please share it and I will work hard to create more write-ups like this!

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    1. velj
    Poništi
  15. proslijedio/la je Tweet
    22. sij

    Releasing an automated pipeline for bugbounty target reconnaissance today. Along with it are 6 blog posts detailing the build process / design. The github repo is tagged to correspond to blog posts. Enjoy! 🙃 repo:

    Poništi
  16. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  17. proslijedio/la je Tweet
    31. sij

    Happy Friday hackers! Nitesh found a critical RCE vulnerability in Jenkins that led us to discover a Bitcoin mining service running on a DoD website 😲. Head over to the disclosed report to see all the details! Thanks for being 🔥 Nitesh

    Poništi
  18. proslijedio/la je Tweet
    11. pro 2019.

    Our team-members and will talk about "Modern PHP Security" at If you're interested in SSRF, SSTI, arbitrary instantiation, disabled_functions / open_basedir bypasses and other pitfalls, let's catch up in Vienna!

    Poništi
  19. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  20. proslijedio/la je Tweet
    31. sij
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·