nils

@nils

Security researcher

UK
Vrijeme pridruživanja: listopad 2007.

Tweetovi

Blokirali ste korisnika/cu @nils

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @nils

  1. proslijedio/la je Tweet
    16. sij

    Part of ~70 layoff yesterday. Been Mozillian (in some form) for ~17 yrs. Anyone wants a (senior) fuzzing security engineer, esp cross-platform 24/7 running, reduction & bisection of fuzzing results? Preferably based in YVR Canada, can travel or DM

    Poništi
  2. proslijedio/la je Tweet
    19. pro 2019.

    Now live! 🔺The new Apple Security Bounty! 🔺The new Apple Platform Security guide, featuring Mac for the first time! (PDF version: ) 🔺My Black Hat 2019 talk: Happy holidays! 🎄

    Poništi
  3. proslijedio/la je Tweet
    11. pro 2019.

    My team in Sunnyvale is looking for a Summer 2020 intern to work on fuzzing-related research. The deadline to apply (for any intern position at Google) for Bachelors/Masters is this Friday and for PhD students Feb 7.

    Poništi
  4. proslijedio/la je Tweet
    6. pro 2019.

    Having lots of fun running escape game today. Still some slots available if you want to come play!!

    Poništi
  5. proslijedio/la je Tweet
    26. stu 2019.

    You gotta be kidding Mi - We just published the Xiaomi Pwn2Own 2018 advisories, which were patched just before Pwn2Own 2019, for silent APK install in the Browser and WiFi categories by and

    Poništi
  6. proslijedio/la je Tweet
    23. stu 2019.

    If you are attending , come to our talk about Fuzzing at Google Scale with ClusterFuzz (co-presenting with ). We will share our experiences with scaling fuzzing for Chrome, 250+ OSS projects and Google products.

    Poništi
  7. proslijedio/la je Tweet
    22. stu 2019.

    Mac secure boot (with two world firsts: DMA defense from PCIe Bus 0, and the Option ROM sandbox), iOS kernel integrity, Pointer Auth Codes (PAC), APRR register, Page Protection Layer (PPL), and novel Find My crypto — all in my slides from Black Hat 2019!

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    6. stu 2019.

    My flashy light script went down well!

    Poništi
  9. proslijedio/la je Tweet
    27. lis 2019.

    Today is the 3rd anniversary of "Attacking JavaScript Engines". Not a lot has changed, but I tried to briefly summarize the things that did: It's been a few month since my last interactions with JSC though, so any corrections/additions are very welcome :)

    Poništi
  10. proslijedio/la je Tweet
    ARM-X Architecture
    ARM-X Launcher Menu
    IP Camera "booted up"
    IP Camera Admin Interface
    Poništi
  11. proslijedio/la je Tweet
    20. lis 2019.
    Poništi
  12. proslijedio/la je Tweet
    16. lis 2019.
    Poništi
  13. proslijedio/la je Tweet
    14. lis 2019.

    Yes!!! :) Get your mathML payloads ready ^^

    Poništi
  14. proslijedio/la je Tweet
    23. ruj 2019.

    From 's keynote; Fuzzing is widely used at Google because _code owners_ are writing their own fuzz targets, as opposed to security experts trying to find bugs in code they aren't familiar with

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    10. ruj 2019.

    First bug bounty submission for Chromium Edge. This kept us busy today. Great work!

    Poništi
  16. proslijedio/la je Tweet
    5. ruj 2019.

    Register now - it is easier than trying to squeeze two heads through the same lanyard ...

    Poništi
  17. proslijedio/la je Tweet
    2. ruj 2019.

    DrSancov, another tiny tool I've been finding useful lately. It's a DynamoRIO plugin which mimics the output of ASAN and SanitizerCoverage, so that you can easily plug in a closed-source app into a fuzzing framework expecting a typical open-source target.

    Poništi
  18. proslijedio/la je Tweet
    8. kol 2019.

    Stuck in the sandbox? We've got your back! Deep dive analysis and full exploit of a Chrome IndexedDB race condition by and :

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    1. kol 2019.

    w0w, uniFuzzer combines LibFuzzer with Unicorn to fuzz closed source binaries, including Arm & Mips code!

    Poništi
  20. proslijedio/la je Tweet
    1. kol 2019.

    Dear people, Penn & Teller of infosec ( and ) are looking for something that needs to be pwned. Please DM your best suggestions to … RTs much appreciated.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·