Maor Shwartz

@malltos92

Founder of , a vulnerability brokerage company (Governments and offensive security companies)

Vrijeme pridruživanja: srpanj 2016.

Tweetovi

Blokirali ste korisnika/cu @malltos92

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @malltos92

  1. Prikvačeni tweet
    2. sij 2019.

    My company () is officially closed! If you want to sell your 0-days to offensive security companies / govs without broker fees - DM me :) It's my way to give back to the community ❤️

    Prikaži ovu nit
    Poništi
  2. 30. sij

    I'm turning 30 in May. Is it the right time to change my LinkedIn photo to a photo of myself in a suit?

    Poništi
  3. 29. sij

    A friendly reminder, if you are interested to sell your 0days (fee free) to highly reliable clients - please contact me and I will be more than happy to help ❤

    Poništi
  4. proslijedio/la je Tweet
    28. sij

    The 360 Alpha team helped Apple to fix 0-click RCE & memory leak bugs in CoreBluetooth, which could allow attackers near by to remote control any Mac systems with zero interaction.

    Poništi
  5. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  6. proslijedio/la je Tweet
    17. sij

    Xiaomi Mi WiFi R3G Vulnerability POC A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.

    Poništi
  7. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi
  8. proslijedio/la je Tweet
    18. sij

    We've added vulnerability information to Telltale for network operators and defenders. We're currently trialing this with CVE-2019-19781 but we'll be sure to add other vulnerabilities in the future. Sign up:

    Poništi
  9. 16. sij

    I'm really sorry to hear that so many good people were laid off today from . If you are security researcher and looking for opportunities, please feel free to DM and I will be more than happy to help (both offensive and defensive opportunities)

    Poništi
  10. proslijedio/la je Tweet

    We have increased our Microsoft Edge bounty awards alongside today's general availability of the new Microsoft Edge. Find out more here:

    Poništi
  11. proslijedio/la je Tweet
    16. sij
    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  12. proslijedio/la je Tweet
    15. sij

    New : -0065-2020 - /- (The detail of know-how & analysis from what I tweeted yesterday: ). There you go. Hope this helps many good folks in battling threats! Enjoy! ! /

    Poništi
  13. 12. sij

    Are there any companies that accept cryptocurrencies other than BTC? *Even companies that used to accept in the past

    Poništi
  14. proslijedio/la je Tweet
    11. sij
    Poništi
  15. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  16. 10. sij

    2) should include the ability to manage different projects 3) Todo list 4) Upload / associate files to project (should be encrypted to) 4) Take notes (meetings summary / general notes) Thank you very much in advance!

    Prikaži ovu nit
    Poništi
  17. 10. sij

    Twitterverse I need your help. I have a lot of projects running simultaneously and I need a recommendation for a project management solution. Requirements: 1) All data will be encrypted both on transit and rest (I should only have the private key) - preferably to on prem

    Prikaži ovu nit
    Poništi
  18. 9. sij

    3) Understanding of the underlying HW of embedded systems 4) ASM/C/C++ knowledge and low-level C programming 5) Vulnerability and exploitation development Remote work position Email: maor@qrecon.com

    Prikaži ovu nit
    Poništi
  19. 9. sij

    One of my clients (offensive security company) is looking for Embedded and IoT vulnerability researcher. Job requirements: 1) SW security hands-on experience of at least 5 years 2) Reverse engineering of x86, x64, MIPS, ARM or others (Hex-Rays IDA Pro and plugin/ development)

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    3. sij

    Exploiting of Windows in the Wild!-Part 2 [ Reversing Part 2] by Nikhil Rathor

    Poništi
  21. proslijedio/la je Tweet
    2. sij

    Public the exploit code for cve-2019-8038 and cve-2019-8039. Two UAF bug in Adobe reader DC. It could pop a calc after disable ASLR. More details will be described after my final exam....

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·