Panda

@pandasec_

Security researcher

France
Vrijeme pridruživanja: srpanj 2015.
Rođen/a 02. travnja

Tweetovi

Blokirali ste korisnika/cu @pandasec_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pandasec_

  1. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  2. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  3. 27. pro 2019.

    If you're interested in Samsung's TrustZone, the talk I gave at is online. It presents the work we did with and at . We are at if you want to come say hi. :)

    Poništi
  4. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  5. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  6. proslijedio/la je Tweet
    24. lis 2019.

    Our team represented by published technical analysis of the checkm8 exploit

    Poništi
  7. proslijedio/la je Tweet
    4. lis 2019.

    📢Registration is now open for Hardware Security Training in Berlin, Germany. ☑️Attacking ARM TrustZone by , & of . More training will be updated soon. 🎟️Register➡️

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    10. ruj 2019.

    [BLOG+TOOL] QBDI 0.7.0 Add X86, android-X86, android-X86_64 and a use case on Tencent Packer.

    Poništi
  9. proslijedio/la je Tweet
    12. kol 2019.
    Poništi
  10. proslijedio/la je Tweet
    9. kol 2019.

    Everybody be cool, this is a robbery: Improving the security of an HSM model "The exploitation of these vulnerabilities allows a remote attacker to gain arbitrary code execution in the HSM and eventually to the theft of every secret key"

    Poništi
  11. proslijedio/la je Tweet
    6. kol 2019.

    Sad to not being able to make it to this year. Huge thanks to my colleague and friend for presenting our work on his own. Don't miss his talk, he has a put a lot of work into it!

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    15. srp 2019.

    I've created a discord server for If you have any kind of questions regarding the website or a crackme, feel free to join.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    4. srp 2019.

    The slides for my talk about Hexagon and aDSP are (finally) available at

    Poništi
  14. proslijedio/la je Tweet
    9. srp 2019.

    New open source tool for LTE, GSM and 3G mobile radio monitoring and protocol analysis in Python: QCsuper

    Poništi
  15. proslijedio/la je Tweet
    18. lip 2019.

    [BLOG+TOOL] LLDBagility: practical macOS kernel debugging: An alternative to classic macOS kernel debugging based on virtual machine introspection based on Fast Debugging Protocol (FDP)

    Poništi
  16. proslijedio/la je Tweet
    3. lip 2019.

    Using Samsung's TrustZone implementation as a target, & & explain and demonstrate how this new attack surface can be leveraged to hijack and exploit trusted components in their Briefing at

    Poništi
  17. proslijedio/la je Tweet
    26. svi 2019.

    I wrote a thing about my macOS sandbox escape & LPE from Pwn2Own

    Prikaži ovu nit
    Poništi
  18. 9. svi 2019.
    Poništi
  19. proslijedio/la je Tweet
    7. svi 2019.

    [BLOG] An overview of macOS kernel debugging Deep dive into Kernel Debugging Protocol (KDP), from implementation to limitation

    Poništi
  20. proslijedio/la je Tweet
    6. svi 2019.

    I wrote an exploit for CVE-2019-9810 to play with BigInts; you can find the sources here: 🍻

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·