POPOPRET

@p0p0pr3t

Mind reader, Security Architect, Like breaking stuff to build better stuff.

Planet Earth
Vrijeme pridruživanja: rujan 2013.

Tweetovi

Blokirali ste korisnika/cu @p0p0pr3t

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @p0p0pr3t

  1. proslijedio/la je Tweet
    19. sij
    Poništi
  2. proslijedio/la je Tweet
    7. sij

    I created a nmap compatible list of all vulnerable software from National Vulnerability Database. A modified version of it will be shipped with the next release of Silver. Dump: Dataset:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    8. sij

    Attack Surface Analyzer v2.1.53 releases: analyze your operating system's security configuration

    Poništi
  4. proslijedio/la je Tweet
    6. sij
    Poništi
  5. proslijedio/la je Tweet
    7. sij

    At Google Project Zero, the team spends a *lot* of time discussing and evaluating vulnerability disclosure policies and their consequences. It's a complex and controversial topic! Here's P0's policy changes for 2020 (with our rationale for the changes):

    Poništi
  6. proslijedio/la je Tweet
    12. pro 2019.

    SetWindowsHookEx Leaks A Kernel Pointer – CVE-2019-1469

    Poništi
  7. Poništi
  8. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  9. proslijedio/la je Tweet
    13. pro 2019.

    Finally: Malwoverview 2.0 (in Python 3.x) is available! There're so many news, so it's better to check on the GitHub ;)

    Poništi
  10. proslijedio/la je Tweet
    12. pro 2019.

    Hey people I just wrote a short post on another kernel info leak I found and a bit about how I approached this research. Hopefully you will find it interesting. Feedback is welcome.

    Poništi
  11. proslijedio/la je Tweet
    12. pro 2019.

    open-source Wi-Fi baseband chip/FPGA design, openwifi is online: . full stack real time SDR (Software Defined Radio) Wi-Fi implementation on FPGA with embedded ARM Linux. compatible with Linux mac80211 SoftMAC framework. Christmas present to research!

    Poništi
  12. proslijedio/la je Tweet
    12. pro 2019.

    Learn how to exploit Symantec Endpoint Protection on all versions of Windows (CVE-2019-12750). Part 2 of this series by delves into a more advanced method of exploitation!

    Poništi
  13. proslijedio/la je Tweet
    7. pro 2019.

    My exploitation note for cve-2019-0708 () on Win7

    Poništi
  14. proslijedio/la je Tweet
    6. pro 2019.
    Poništi
  15. proslijedio/la je Tweet
    5. pro 2019.

    Humbled by the amazing free resources out there if you want to learn the art and science of reverse engineering. with the latest entry in the ring! 💪 Others: 🙇‍♂️

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    4. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    2. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    26. velj 2018.

    Memory segmentation cheat sheet

    Poništi
  19. proslijedio/la je Tweet
    3. pro 2019.

    Huh, didn't know windbg had a built-in tracer :

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·