Niemand  

@niemand_sec

Security Consultant at . I'm a system engineer, who loves security. Opinions are my own

Argentina
Vrijeme pridruživanja: svibanj 2016.

Tweetovi

Blokirali ste korisnika/cu @niemand_sec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @niemand_sec

  1. Prikvačeni tweet
    3. srp 2019.

    "AntiCheat-Testing-Framework" is all the code developed during my research for I hope it will help people understand how Anti-Cheats work, and let them dive into this amazing topic. Feel free to collaborate.

    Poništi
  2. 4. velj
    Poništi
  3. proslijedio/la je Tweet
    30. sij

    is proud to announce offensive security expert Marco Ivaldi () will be presenting: The INFILTRATE Effect: 6 Bugs in 6 Months — Don't miss out. REGISTER TODAY!

    Poništi
  4. 31. sij

    Reversing XignCode3 Anticheat – Registering Notify and Callback Routines Part 4.1 is out! 🤯 Anti-cheats use callbacks and notification routines to control what is happening on your system, let's dig into this

    Poništi
  5. 30. sij

    Interesting graph if you are playing to do any sort of certification :)

    Poništi
  6. proslijedio/la je Tweet
    27. sij
    Poništi
  7. proslijedio/la je Tweet
    24. sij

    Ever get a pointer to the middle of a struct? Just add the __shifted keyword to the variable's type definition!

    Poništi
  8. 24. sij

    Reversing XignCode3 Anticheat - Part 3 is now out! 🥳 Understanding dispatcher functions is fundamental for reversing Windows drivers. Let's see how this Anti-cheat dispatch the IRP requests.

    Poništi
  9. 24. sij
    Poništi
  10. 23. sij

    I have used this tool before and it does what it says it does! If you are trying to dump a process that has usermode protections this could be a great option. For kernel protection, you will need to use a different technique to load the unsigned driver :)

    Poništi
  11. 22. sij
    Prikaži ovu nit
    Poništi
  12. 22. sij

    your opinion is required :P

    Prikaži ovu nit
    Poništi
  13. 22. sij

    🔥🔥 Trending topic at the office today. Fanny pack, yes or no? Riñonera, si o no? Discusión acalorada en la offi. 🔥🔥

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    22. sij

    Because Hardware and Photography can be enjoy together.

    Poništi
  15. 21. sij
    Poništi
  16. 21. sij

    Sometimes people think about this only when doing bug bounties, but it can be really useful when doing recon during a pentest. A single list with a miss-configuration like that could provide you the access level you need to trigger a better attack vector.

    Poništi
  17. 21. sij

    What I like the most about these bugs it's not just finding them but also to figure out the side effects it may have on the game. Nice video :)

    Poništi
  18. proslijedio/la je Tweet
    20. sij

    When doing some Hardware Hacking sometimes you can’t or prefer to avoid soldering stuff to the PCB. Using Hot Glue Gun and the proper angle could do the trick.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    18. sij

    I'm putting together a list of resources for learning about PE file format and Windows Loader, can you recommend me the best resources to add to this guide?

    Poništi
  20. proslijedio/la je Tweet
    16. sij

    My favorite articles are the ones that walks you through the author methodology and strategy to find/exploit bugs. This is the case for last post on Chrome IPC vulnerabilities:

    Poništi
  21. proslijedio/la je Tweet
    15. sij

    Part 2 of our PicoCTF tutorial

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·