Maycon Maia Vitali

@mayconvitali

Break stuff MayconVitali @ Instagram Maycon @ GitHub All opinions are my own!

Vila Velha, ES
Vrijeme pridruživanja: srpanj 2009.

Tweetovi

Blokirali ste korisnika/cu @mayconvitali

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mayconvitali

  1. proslijedio/la je Tweet
    3. velj

    I call it 'coding by mutation' RegEx: keep adding dots and slashes until shit matches, C: keep adding * and & until shit compiles, Binja API: keep adding .src and .value until shit works, give me your best examples :)

    Poništi
  2. proslijedio/la je Tweet
    24. sij

    Hello world!

    Poništi
  3. 24. sij

    17º Hangout Xtreme Security - Introdução a Exploração de Corrupção... via

    Poništi
  4. 24. sij

    H2HC University 2018 - Internet of Sh!t - Maycon Vitali via

    Poništi
  5. 23. sij
    Poništi
  6. 2. sij

    “whenever you get free time, teach yourself how to code.”

    Poništi
  7. 2. sij
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    2. sij

    FELIZ ANO NOVO, HEIN? O primeiro do ano tá imperdível. Olha só:

    Poništi
  9. proslijedio/la je Tweet
    Odgovor korisniku/ci

    THE ONLY THING THAT CAN STOP A BAD GUY WITH AN EXPLOIT IS A GOOD GUY WITH AN EXPLOIT YEEE-HAWWWW 🤠🤠🤠🤠

    Poništi
  10. proslijedio/la je Tweet

    Calling all bug hunters! Do you eat, breathe, and sleep 0day? We're looking for an Researcher to conduct research and exploit development against highly-secured products. Got what it takes? Apply online >>

    Poništi
  11. proslijedio/la je Tweet
    2. kol 2019.

    Collection of tools, techniques and useful links concerning security and exposed AWS S3 Buckets

    Poništi
  12. proslijedio/la je Tweet

    I am starting a new thing named Research Notes, which is the open source fraction of my research notebook on systems internals, vulnerability discovery and exploit development: And the first Research Note: “iBoot address space”

    Poništi
  13. proslijedio/la je Tweet

    Confirmed! The Flashback team of & used an auth bypass followed by a stack buffer overflow to get a shell on the . They earned $5K and .5 Master of Pwn points in their 1st attempt.

    Poništi
  14. proslijedio/la je Tweet
    30. lis 2019.

    When management "helps" remediate the incident...

    Poništi
  15. 26. lis 2019.

    Fui entrevistado pelo . Em breve no YouTube mais próximo de você! (-;

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    18. lis 2019.

    Lots of researchers from team will be next week! We have and giving talks. is the editor of the H2HC magazine. is one of the organizers. is going just for the fun!

    Poništi
  17. proslijedio/la je Tweet
    14. lis 2019.

    Para relembrar, um dos melhores hangouts do canal . Valeu por esse dia galera! , , , , , e

    Poništi
  18. proslijedio/la je Tweet
    26. ruj 2019.

    Respeitável público, está no ar o CFP da Alligator 2019 - Le Cirque Edition:

    Poništi
  19. proslijedio/la je Tweet
    3. ruj 2019.

    O PT sempre trabalhou(roubou) para manter os pobres na miséria.

    Poništi
  20. proslijedio/la je Tweet
    21. kol 2019.

    We ran our first event during the last in Las Vegas. Check out the results and pictures below (White paper is also linked in the blog post).

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·