Bruno Oliveira

@mphx2

hacking, exploiting, pwning, compromising, attacking and more synonyms! [my opinions]

Vrijeme pridruživanja: studeni 2009.

Tweetovi

Blokirali ste korisnika/cu @mphx2

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mphx2

  1. Prikvačeni tweet
    9. sij
    Poništi
  2. 30. sij
    Poništi
  3. 15. sij
    Poništi
  4. proslijedio/la je Tweet
    13. sij

    Released a little tool to perform lateral movement that hide the command you are executing by registering a protocol handler. The protocol handler is executed over WMI by simply running start customhandler:// ❤

    Poništi
  5. proslijedio/la je Tweet
    10. sij

    Trustwave SpiderLabs Principal Security Consultant returns with his latest installment in this 3-part series on Windows debugging and exploiting. Read them all on the Trustwave SpiderLabs blog:

    Poništi
  6. proslijedio/la je Tweet
    9. sij

    In the third part of his series on Windows & Exploiting discusses WinDBG Time Travel feature: and if you missed the first two parts, this is the perfect time to catch up!

    Poništi
  7. proslijedio/la je Tweet
    15. pro 2019.

    It’s on like Donkey Kong: Call for Papers for 14, send your applications through

    Poništi
  8. 21. stu 2019.
    Poništi
  9. proslijedio/la je Tweet
    20. stu 2019.

    Como cliente você assume o compromisso de pagar a mais para receber o pedido completo no dia 14/11, mas alguns itens só chegam no dia 19/11. Justo ? Para mim é picaretagem, please RT

    Poništi
  10. proslijedio/la je Tweet
    14. stu 2019.

    CVE-2019-11931 A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE.

    Poništi
  11. proslijedio/la je Tweet
    15. stu 2019.

    Paged Out! #2 Thanks to all the authors and the institute! Enjoy!

    Poništi
  12. proslijedio/la je Tweet

    Trustwave EMEA Director Ed Williams discusses when it's the right time to leverage a Red Team in this recent article.

    Poništi
  13. proslijedio/la je Tweet
    7. stu 2019.

    Confira a agenda da 6a. ed. da Nullbyte Security Conference em

    Poništi
  14. 7. stu 2019.

    Parabéns pelo write-up, super detalhado!

    Poništi
  15. 5. stu 2019.
    Poništi
  16. proslijedio/la je Tweet
    31. lis 2019.

    Releasing a new version of Cemu: 0.5 - Impish Tradition. Many cool new features, including more customization and now the possibility to create ready-to-run PE files directly from assembly (thanks to ) Check it out:

    Poništi
  17. 31. lis 2019.

    My exploit from the Windows challenge , just solved, quite fun! I’ll do the write-up soon, not sure if anyone did there but here it goes - cc:

    Poništi
  18. proslijedio/la je Tweet
    27. lis 2019.

    Today is the 3rd anniversary of "Attacking JavaScript Engines". Not a lot has changed, but I tried to briefly summarize the things that did: It's been a few month since my last interactions with JSC though, so any corrections/additions are very welcome :)

    Poništi
  19. 26. lis 2019.
    Poništi
  20. 23. lis 2019.

    Also before , I’ll be at this Saturday 4:40pm still talking about some Windows stuff :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·