\xeb\xfe

@n0psledbyte

passionate in reverse engineering and binary exploitation, 18, 🇮🇩 ||

$rbp+8
Vrijeme pridruživanja: srpanj 2016.

Tweetovi

Blokirali ste korisnika/cu @n0psledbyte

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @n0psledbyte

  1. Prikvačeni tweet
    20. sij

    my new current project. automatic ropchain generation!

    Prikaži ovu nit
    Poništi
  2. prije 19 sati

    my favorite testcase, this shows exrop can build complex gadget chain without worrying about clobbered registers

    Poništi
  3. 3. velj

    working on exrop today, now exrop can avoid bad characters in gadget chain more better. tested using my local libc, can compare with the other ropgenerator tool, which can't build gadget chain in the same case

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    27. sij

    Hail Hacker/s; Kami baru saja merilis “Call for Proposal” bagi komunitas/universitas/organisasi yang berminat untuk menjadi “host” IDSECCONF2020, untuk info lebih detail dapat di lihat di

    Poništi
  5. proslijedio/la je Tweet
    30. sij
    Poništi
  6. proslijedio/la je Tweet
    29. sij
    Poništi
  7. 30. sij

    I'm going to release exrop beta version after refactoring and fix some bugs

    Prikaži ovu nit
    Poništi
  8. 30. sij

    refactoring makes most of the things broken :/

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  10. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  11. 26. sij

    pake exrop ga perlu buat chainnya secara manual wkwk. solved

    Poništi
  12. proslijedio/la je Tweet
    23. sij

    10 days left to get your code into the Arctic Code Vault! On 02/02/2020, we will make a copy of every active public repository on GitHub to preserve them in a decommissioned coal mine for over 1,000 years.

    Poništi
  13. proslijedio/la je Tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi
  14. proslijedio/la je Tweet
    23. sij

    Saat itu, Kehidupan sebelum adanya internet. Apalagi twitteran kek gini ☹ -♡🙂

    Prikaži ovu nit
    Poništi
  15. 25. sij

    got 100 stars on github :)

    Poništi
  16. 25. sij
    Poništi
  17. proslijedio/la je Tweet

    Deal with it. Did anyone here meet the previous software developer? I never did. Either you get a zip file (not kidding) or git repo with zero docs. Thanks for lulz.

    Poništi
  18. proslijedio/la je Tweet
    23. sij

    CVE-2020-0609 & CVE-2020-0610 Before / After patch Pseudo-code

    Poništi
  19. 23. sij

    trying to handle non-return gadgets, and ability solve reg to reg (like rdi=rax). the result today, you can pass register as an argument in function call.

    Poništi
  20. proslijedio/la je Tweet
    22. sij

    Possibly one of the best series in RE for malware analysis from basic to advance, , not new but not obsolete.

    Poništi
  21. 22. sij

    implementing badchars avoiding in my exrop

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·