Marco Grassi

@marcograss

Senior Security Researcher @ Keen Lab

Vrijeme pridruživanja: siječanj 2011.

Tweetovi

Blokirali ste korisnika/cu @marcograss

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @marcograss

  1. 25. sij

    will the Bezos phone report/analysis win something next year at pwnie awards?

    Poništi
  2. proslijedio/la je Tweet
    21. sij

    0x41con 3rd [time is a charm] edition: 1-2 May 2020, Thessaloniki, Greece /cc

    Poništi
  3. proslijedio/la je Tweet
    21. sij

    We'll start sending invites soon. Please contact , or if you want to join us. Pro-tip: they can be bribed with 0days, talks, warez...

    Poništi
  4. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  5. proslijedio/la je Tweet
    2. sij
    Poništi
  6. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  7. proslijedio/la je Tweet
    27. pro 2019.

    This is a huge problem: it would imply that all jailbreaks are illegal, and that is destroying the basis for almost all security researchers. Would be really bad for all of us if Apple wins this case.

    Poništi
  8. proslijedio/la je Tweet
    28. pro 2019.

    🙏 We also have the utmost respect for all our engineering friends and counterparts working at Apple.

    Poništi
  9. proslijedio/la je Tweet
    27. pro 2019.

    Deeply Fucking Concerning - this case is going to have some serious implications.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet

    I found the old Qemu code for emulating the iPhone4. I just have to clean it up and write some instructions for using it. I will post in the next few days. If you want to help DM me and I will give you GitHub access. Cc

    Poništi
  11. proslijedio/la je Tweet

    Just applied with to to present our talk “OLED burn-in compensation image recovery using SEP execution with PAC bypass on iPhone XS” hope to see you in Miami!

    Poništi
  12. proslijedio/la je Tweet
    26. pro 2019.

    We’ve just made a new ADAMANT release v2.3.0, and built apps for , , , and GNU/:

    Poništi
  13. proslijedio/la je Tweet
    24. pro 2019.

    To all the builders of Offensive Security Tools, udite udite! Lets make 2020 the year of Mayhem releasing as much as we can from our arsenals. Fuck the snake oil security products lobby, Fuck training charlatans, Fuck self-proclaimed experts. Make Mayhem like a Joker 🤹‍♀️🤹‍♀️🤹‍♀️

    Poništi
  14. proslijedio/la je Tweet
    20. pro 2019.

    Cutter v1.10 now has a DEBUGGER! 🐞🥳 After a lot of work, we are so happy to announce that we finally implemented your most requested feature. The beta version of the debugger is available NOW on our website >> List of features and what's coming next >>

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    18. pro 2019.

    Want to filter multi-gigabyte log with regex and get instant result as you type? This should help 😀

    Poništi
  16. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  17. 16. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    11. pro 2019.
    Odgovor korisniku/ci

    I need some expert legal advice then. /, you guys might know better, any opinion on this one?

    Poništi
  19. proslijedio/la je Tweet
    9. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    9. pro 2019.

    Simplifying iOS Research: Booting the iOS Kernel to an Interactive Bash Shell on QEMU by

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·