Tweetovi

Blokirali ste korisnika/cu @pmontesel

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pmontesel

  1. 27. sij

    TIL: `type(re.match(b'(?P<\xFF>.?)', b'').lastgroup) == str`

    Poništi
  2. 19. sij
    Poništi
  3. proslijedio/la je Tweet
    15. sij

    Check out VULCANUS IN JAPAN Program🇯🇵🇪🇺 1 year in the country of the rising sun (industrial placement+language course) for EU/Cosme students. 🗓️Deadline 20 Jan 2020

    Poništi
  4. Thanks for not allowing me to join my family for New Year's Eve. Anyone wants to throw a party after ?

    Poništi
  5. proslijedio/la je Tweet
    25. pro 2019.

    We made a website which shows a genealogy of fuzzers: Basically, this is a fork from the one we have in the survey, but which we can keep up-to-date and where anyone can contribute at:

    Poništi
  6. proslijedio/la je Tweet
    13. pro 2019.

    I and are organizing a round table about new directions in at We'll try to not overlap fuzzing talks (we can change the time slot later if the room is available). Join if you're in the fuzzing loop (we'll publish a signup form ASAP)

    Prikaži ovu nit
    Poništi
  7. This is amazing, is a PoC that runs ELFs in an hypervisor by forwarding syscalls to the host kernel

    Poništi
  8. proslijedio/la je Tweet
    22. stu 2019.

    10 years ago launched the Shodan website! To celebrate a decade of discovery and growth we're going to offer the membership for $1 (marked down from $49) for the next 24 hours (0:00 UTC to 24:00 UTC):

    Poništi
  9. proslijedio/la je Tweet
    28. lis 2019.

    honggfuzz-rs has already found dozens of bugs in Rust packages, the python-hfuzz might help you to do the same with your python code: (from the author of honggfuzz-qemu).

    Poništi
  10. So... Apparently you can encode textbook-style regexps as protobufs and let libprotobuf-mutator generate valid text

    Poništi
  11. Had to code some java-based library today. Apparently I like . Like, a lot. I'm finally enterprise level.

    Poništi
  12. proslijedio/la je Tweet
    28. lis 2019.

    [PoC] CVE-2019-11932 Whatsapp 2.19.216 Remote Code Execution 1. set the listner ip (nc -lvp 5555) 2. run ./exploit and save the content to .gif 3. exploit.gif file and send it as Document with WhatsApp to another WhatsApp user

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    18. kol 2019.

    5764 thank you to everyone who donated to our crowdfunding! This is how much we collected and it helped a lot! We pushed as hard as we could to repay your trust ♥

    Poništi
  14. Poništi
  15. proslijedio/la je Tweet
    12. kol 2019.

    After enough hours of sleep it's time to announce that we got the 5th place at CTF as the best European team! Congrats to PPP () for collecting more black badges this year and hosting us at the after-party, you guys are awesome! 🚩

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    12. kol 2019.

    We survived CTF with the fine chefs of ! 🍝 Crazy nice 5th place this year 🚩 amazing game, thanks & props to the champions

    , , i još njih 3
    Poništi
  17. Time to flex a bit :D this, coupled with a QBDI-based tool to track parsing progress, enabled us to understand aoool without going crazy CTF

    Poništi
  18. Poništi
  19. proslijedio/la je Tweet
    5. kol 2019.

    Here are the slides for my RECON and BlackHat presentation, "Automation Techniques in C++ Reverse Engineering":

    Poništi
  20. When your LSTM overfits on populist tweets

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·