F. Javier Santiago

@n0ipr0cs

Security Consultant ..: in Opinions or messages expressed here are solely my own and do not express the views or opinions of my employer.

Neverland
Vrijeme pridruživanja: ožujak 2011.

Tweetovi

Blokirali ste korisnika/cu @n0ipr0cs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @n0ipr0cs

  1. 5. velj

    Red Team Development and Operations Guides

    Poništi
  2. 5. velj

    Ghost in the shell: Investigating web shell attacks - Microsoft Security

    Poništi
  3. proslijedio/la je Tweet
    4. velj

    En la web de Canal Sur tenéis disponible de forma gratuita el magnífico documental “Equipo D: Los códigos olvidados” de . La apasionante y desconocida historia de los criptógrafos españoles que lucharon para romper las Enigma nazis:

    Prikaži ovu nit
    Poništi
  4. 4. velj

    Heap Overflow in F-Secure Internet Gatekeeper · Doyensec's Blog

    Poništi
  5. 4. velj
    Poništi
  6. proslijedio/la je Tweet
    3. velj
    Poništi
  7. 4. velj
    Poništi
  8. 4. velj
    Poništi
  9. 4. velj
    Poništi
  10. 4. velj

    Explorer Notebook Series: The Linux Host Explorer - Microsoft Tech Community - 1138273

    Poništi
  11. 4. velj
    Poništi
  12. Poništi
  13. 3. velj

    Expanding the Attack Surface: React Native Android Applications – Assetnote

    Poništi
  14. 3. velj

    GitHub - LinusHenze/Fugu: Fugu is the first open source jailbreak based on the checkm8 exploit

    Poništi
  15. 3. velj

    Nueva pista para solucionar Kryptos, el gran enigma cifrado de la CIA | Tendencias | EL PAÍS Retina

    Poništi
  16. 3. velj

    La inteligencia artificial ya puede crear vídeos inventados a partir de audios | Innovación | EL PAÍS Retina

    Poništi
  17. 3. velj

    Atacantes empiezan a usar el coronavirus para realizar ataques de phishing y malware — Una al Día

    Poništi
  18. proslijedio/la je Tweet

    New ported iotsecfuzz module: flash_spi_der - use arduino as SPI memory programmator (based on ). Check instruction at and install with isfpm! P.S. Don't forget that you can also use this module as a python3 library!

    Poništi
  19. 3. velj

    GitHub - DotDotSlashRepo/vulnrestdocker: Vulnerable REST based PHP webservice deployed in Docker

    Poništi
  20. 3. velj

    Memory Lane - Direct Memory Access Attacks | Eclypsium

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·