Tweetovi

Blokirali ste korisnika/cu @pwnlll

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pwnlll

  1. proslijedio/la je Tweet
    27. pro 2019.

    Xmas is over & Santa is back drinking Vodka. 🎁Time for WHIDelite 🎁 ✅ Follow ✅ Retweet this post ✅ Like this post Deadline: 3/1/2020 9:00 GMT

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    6. pro 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    It's one of the reasons I spend less time on synack. When your bugs arent accepted during this time, synack will do nothing to tell you why/help your report writing get better to be accepted. They also allow cramming multiple bugs into 1 report to make it "better"

    Poništi
  3. proslijedio/la je Tweet
    6. stu 2019.

    So has graciously sponsored our journey to 10k followers by offering a voucher to their Penetration Testing Professional Elite course. To enter: 1) Like and R/T this tweet 2) Follow and me Once we've both crossed 10k, a winner will be chosen!

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    18. lis 2019.

    I found an old $50 ebook voucher from that I’ve not used. I’d like to give the code to someone. Here’s how, reply to this tweet that you want it and which book(s) you’d use it for. I’ll pick someone later tonight. It says the code does not expire, let’s hope🤞🏻🤞🏻🤞🏻.

    Poništi
  5. proslijedio/la je Tweet
    25. kol 2019.

    Exploiting SQLite to pwn the C2 of a password stealer AND gain persistent kernel privs on iOS, by 💯

    Poništi
  6. proslijedio/la je Tweet
    25. kol 2019.
    Poništi
  7. proslijedio/la je Tweet
    4. lip 2019.

    Techblog: CPU isolation of containers at Netflix. Learn how we've used algorithms, Linux primitives and smart OS scheduling to isolate workloads and improve efficiency.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    8. tra 2019.

    Being inspired by , and vlogs, I decided to start my own. Today's lecture Analysis explains the techniques for malicious DOCX and XLSX files analysis.

    Poništi
  9. proslijedio/la je Tweet
    Poništi
  10. proslijedio/la je Tweet
    15. velj 2019.

    Comedy gold. So Adobe "fixed" an integer overflow by blocking the one value in the PoC.

    Poništi
  11. proslijedio/la je Tweet
    Poništi
  12. proslijedio/la je Tweet
    15. velj 2019.

    I published the slides of the presentation I gave and about Attacking Edge through the JIT compiler. I also contains exploit code for CVE-2018-8266

    Poništi
  13. proslijedio/la je Tweet
    15. velj 2019.

    My browser exploitation repository. Some write-ups are written in korean and some are unavailable now. I'm trying to re-write them in English ! If you got some error in write-up or exploit code, contact me, plz :)

    Poništi
  14. proslijedio/la je Tweet
    13. velj 2019.
    Odgovor korisnicima

    In this case I used my vectorized emulator (). This gave me about 400,000 fuzz cases per second. At this speed I was able to do coverage feedback and literally just flipping random bytes. Hundreds of billions of fuzz cases a week makes the mutator easy 🤗

    Poništi
  15. proslijedio/la je Tweet
    12. velj 2019.

    I wrote my webkit exploitation several weeks ago. For those who are interested the detail, you can view it hereL

    Poništi
  16. proslijedio/la je Tweet
    11. velj 2019.

    The latest recap video is up now, where we do a quick rundown talking about the first two VirtualBox CVEs we looked at on stream:

    Poništi
  17. proslijedio/la je Tweet
    10. velj 2019.

    Wondering about Android and Apple phone security? Here's an objective chart to help you decide:

    Poništi
  18. proslijedio/la je Tweet
    10. velj 2019.

    As always, don't forget to subscribe to stay updated with the latest and news and tutorials! :-) Join the squad at:

    Poništi
  19. proslijedio/la je Tweet
    10. velj 2019.

    Here is my obfuscated payload. It bypasses lots of WAF, including CloudFlare iirc. <iframe src="%0Aj%0Aa%0Av%0Aa%0As%0Ac%0Ar%0Ai%0Ap%0At%0A%3Aalert(0)"> iFrame with javascript URI payload. Line feeds [CRLF] obfuscate it.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    10. velj 2019.

    Introduction to IoT Reverse Engineering - with an example on a home router [SLIDES] by

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·