Tweetovi

Blokirali ste korisnika/cu @pauldevt

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pauldevt

  1. proslijedio/la je Tweet
    16. sij

    Zelda OOT speedruns in 2020: "yeah we just manipulate the heap by lifting rocks to exploit a use-after-free and rewrite a function pointer to jump into a multi stage payload involving Link's name and the buttons pressed on controllers 1 and 3"

    Poništi
  2. proslijedio/la je Tweet
    9. sij

    Remember the demo I showed during my Black Hat talk? This is how it works!

    Poništi
  3. proslijedio/la je Tweet
    6. sij

    I gave a lightning talk at the on PathAuditor: The main point I tried to make is that this bug class is fun to research and easy to find. If you've watched it, I'd love some feedback:

    Poništi
  4. proslijedio/la je Tweet
    5. sij
    Poništi
  5. proslijedio/la je Tweet
    21. pro 2019.

    Here is ’s experience of the Google escal8 travel. I’m also in it

    Poništi
  6. proslijedio/la je Tweet
    19. pro 2019.

    Now live! 🔺The new Apple Security Bounty! 🔺The new Apple Platform Security guide, featuring Mac for the first time! (PDF version: ) 🔺My Black Hat 2019 talk: Happy holidays! 🎄

    Poništi
  7. proslijedio/la je Tweet
    17. pro 2019.

    I've received some great feedback after published a video about one of my Google Cloud Shell bugs. That's why i've decided to publish a series of posts on my blog: . Thanks to for a year filled with fun!

    Poništi
  8. proslijedio/la je Tweet
    9. pro 2019.

    More than happy to come back to this great group next year 🚀 Pls use and tell us about the bugs you find!

    Poništi
  9. proslijedio/la je Tweet
    9. pro 2019.

    We open sourced PathAuditor: a tool for Linux that and I worked on this summer. Tl;dr: you can use it to instrument root daemons and find insecure file access patterns like CVE-2019-3461. Check out the code: Blog post:

    Poništi
  10. proslijedio/la je Tweet
    25. stu 2019.

    So has an automated process to deal with tiger profiles. It even has 🐅 emojis 🐅! The beauty of scale.

    Poništi
  11. proslijedio/la je Tweet
    7. stu 2019.

    Over the last weekend I was fortunate enough to visit Google in London to attend init.g, a cyber security workshop for students. Love the name pun! ;) More on my experience here:

    Poništi
  12. proslijedio/la je Tweet

    Android Security Rewards expands program and increases rewards! Check out the blog for more details.

    Poništi
  13. proslijedio/la je Tweet
    21. stu 2019.

    PCB design + firmware source for my finals challenge 'having a blast' is now open source - - in case you want to print the PCB I'd suggest two improvements: use the correct footprints for the 74LVC2G86 and the dip switches

    Poništi
  14. proslijedio/la je Tweet

    CTF players, bug hunters and students descended onto London to play, hack and learn. Congrats to for winning - again! :)

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    19. stu 2019.

    I presented about Site Isolation in Google's event called 🙂 / "The world of Site Isolation and compromised renderer" Slide: Video:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    19. stu 2019.

    We just released the challenges of this year's finals together with a short write up of the intended solutions: If anything is not clear, feel free to DM me and I can share more details about the challenges.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    12. stu 2019.

    I published yet another article about Cache Probing Attack! Today I discovered that the report has been indexed by crawlers, so I reached out to and with his approval, created a short article about my findings :)

    Poništi
  18. proslijedio/la je Tweet
    Poništi
  19. proslijedio/la je Tweet
    4. stu 2019.

    Pasten wins finals once again 💪 Awesome CTF, thanks guys!

    Poništi
  20. proslijedio/la je Tweet
    5. stu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·