patate

@patateQbool

Et la grenouille de smack avec sa p'tite casquette !

Vrijeme pridruživanja: lipanj 2016.

Tweetovi

Blokirali ste korisnika/cu @patateQbool

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @patateQbool

  1. Prikvačeni tweet
    11. ruj 2018.

    and I are proud to present our collaborative RE plugin for IDA and Hex-Rays. Check it out:

    Poništi
  2. proslijedio/la je Tweet
    27. sij

    Linux kernel 5.5 includes kcov extension that allows to collect code coverage from background kernel threads:

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    Interested in learning Windows Kernel exploitation ? wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.

    Poništi
  4. proslijedio/la je Tweet
    27. sij

    Can't wait to present the progress we've made since at ! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.

    Poništi
  5. proslijedio/la je Tweet
    25. sij

    This morning I decided to experiment a bit with QASan in full system mode. It works with a small firmware and now I'm trying to boot a patched SerenityOS. You can find my attempts here:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    23. sij

    Wow, crazy issue bypasses PAN: Part of the uaccess routines (__arch_clear_user() and __arch_copy_{in,from,to}_user()) fail to re-enable PAN if they encounter an unhandled fault while accessing userspace. Check out the patch:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    20. sij

    Another kernel reversing utility script for IDA: Auto-labels + names the pointer in x18 in decompiler output. Bring your own type definition for KCoreLocalRegion (I'll publish all my typedefs "eventually" but I don't have modern kernel fully labeled yet)

    Poništi
  8. proslijedio/la je Tweet
    16. sij

    I love the gaming exploit community! Here's a use after free exploit for Ocarina of Time that can be input via a controller:

    Poništi
  9. proslijedio/la je Tweet
    14. sij
    Poništi
  10. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    27. pro 2019.

    Friday night tweetin' for those that want their Ida and their Ghidra too. Chock full o' bugs no doubt.

    Poništi
  12. proslijedio/la je Tweet
    27. pro 2019.

    If you're interested in Samsung's TrustZone, the talk I gave at is online. It presents the work we did with and at . We are at if you want to come say hi. :)

    Poništi
  13. proslijedio/la je Tweet
    26. pro 2019.

    New blogpost: Sanitized Emulation with QEMU-AddressSanitizer I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    18. pro 2019.

    Frida 12.8 is out with massively enhanced support for in-process fuzzing use-cases, including Objective-C and Java calls

    Poništi
  15. proslijedio/la je Tweet
    17. pro 2019.

    WU for challenges "secure flag storage" : With some tips for debugging OP-TEE with

    Poništi
  16. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    11. pro 2019.

    Get the Ultimate Privilege of Android Phone [VIDEO] by Guanxing Wen

    Poništi
  18. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  19. proslijedio/la je Tweet
    24. stu 2019.

    AMD slides on SEV-SNP, allowing a VM to distrust the hypervisor if it trusts AMD hw + fw:

    Poništi
  20. proslijedio/la je Tweet
    3. stu 2019.

    TIL that Heartbleed is technically an RCE (well, at least heap corrpution) on architectures where `sizeof(int) == 2`. Learned this the fun way by questioning my 6502 build of OpenSSL for finding Heartbleed!

    Poništi
  21. proslijedio/la je Tweet
    29. lis 2019.

    [BLOG] EEPROM: When Tearing-Off Becomes a Security Issue by

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·