MicrosVuln

@microsvuln

Vulnerability under the 🔬Microscope

Microscope
Vrijeme pridruživanja: svibanj 2019.

Tweetovi

Blokirali ste korisnika/cu @microsvuln

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @microsvuln

  1. Prikvačeni tweet
    15. stu 2019.

    Awesome-AFL : A curated list of different AFL forks and AFL inspired with detailed equivalent academic papers with AFL-fuzzing tutorials

    Prikaži ovu nit
    Poništi
  2. 3. velj

    Control Flow Integrity in the Linux Kernel" - Kees Cook (LCA 2020)

    Poništi
  3. 3. velj

    Tor-Router A tool that allow you to make TOR your default gateway and send all internet connections under TOR (as transparent proxy) for increase privacy/anonymity without extra unnecessary code.

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    Yet another vulnerability in sudo

    Poništi
  6. 1. velj

    DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    Do you know ? It brings interesting add-ons to AFL. used it during his fuzzing research to create custom instrumentation whitelists, increasing AFL code coverage

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!

    Poništi
  9. 30. sij

    PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610 python

    Poništi
  10. proslijedio/la je Tweet

    🎉 New blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous / package using coverage-guided fuzzer. ➡️ Fuzzer: Jsfuzz by ➡️ Target: wasm-parser ➡️ Bug: DoS/OOM

    Poništi
  11. 29. sij

    Fuzzing software: common challenges and potential solutions (Part 1)

    Poništi
  12. 27. sij

    A few more efficient fuzzers has already been added to list . Check Thanks to van Hauser

    Prikaži ovu nit
    Poništi
  13. 22. sij

    ApplicationInspector - source code analyzer by Microsoft

    Poništi
  14. 10. sij

    Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)

    Poništi
  15. proslijedio/la je Tweet
    5. sij

    Interesting paper qualitatively analyzing reverse engineering process & methods

    Poništi
  16. proslijedio/la je Tweet
    20. pro 2019.

    Qt Gif parsing null deref rediscovered with

    Poništi
  17. proslijedio/la je Tweet
    19. pro 2019.

    Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): Hoping to spread the RE fever :)

    Poništi
  18. 19. pro 2019.
    Poništi
  19. 19. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    16. pro 2019.
    Odgovor korisniku/ci

    Procmon works very well for me. If I were to write my own tooling, I would write something similar to process monitor, atleast visually, that allows you to hook arbitrary functions (ones that are used for resource access) to find race conditions elsewhere, not just filesystem

    Poništi
  21. proslijedio/la je Tweet
    13. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·