Ravi Pandey

@ravipandey0007

Cyber Security Enthusiast| Reverse Engineering|Malware Research|Memory Forensics|Incident Response|Security Researcher| Always be a learner... :-)

India
Vrijeme pridruživanja: srpanj 2010.

Tweetovi

Blokirali ste korisnika/cu @ravipandey0007

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ravipandey0007

  1. proslijedio/la je Tweet
    25. sij
    Poništi
  2. proslijedio/la je Tweet
    24. sij
    Poništi
  3. proslijedio/la je Tweet

    A bunch of links related to Linux kernel exploitation

    Poništi
  4. proslijedio/la je Tweet
    15. sij

    New : -0065-2020 - /- (The detail of know-how & analysis from what I tweeted yesterday: ). There you go. Hope this helps many good folks in battling threats! Enjoy! ! /

    Poništi
  5. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    2. sij

    Public the exploit code for cve-2019-8038 and cve-2019-8039. Two UAF bug in Adobe reader DC. It could pop a calc after disable ASLR. More details will be described after my final exam....

    Poništi
  7. proslijedio/la je Tweet
    27. pro 2019.

    Our presentation on VMware Virtual Machine Escape () is in process. Please watch it in room BORG or on

    Poništi
  8. proslijedio/la je Tweet

    PE Import Table hijacking as a way of achieving persistence/exploiting DLL side loading (Christmas blog post 😉):

    Poništi
  9. proslijedio/la je Tweet
    27. pro 2019.

    My talk on iMessage exploitation () starts in two hours. You can watch it in room Ada or on

    Poništi
  10. proslijedio/la je Tweet
    24. pro 2019.

    🔥 NEW iOS 13.3 / 13.2 / 13.0 A12 / A13 tfp0 EXPLOIT (iPhone 11 and lower) VIDEO: YES! A DIFFERENT one than the one presented 2 days ago. And yes, A13, A12, A11, and lower. This would be pretty useful for updating the Unc0ver Jailbreak.

    Poništi
  11. proslijedio/la je Tweet
    23. pro 2019.

    Our latest blog, Mozi, another botnet uses DHT protocol targeting weak telnet password and 11 different vulnerabilities

    Poništi
  12. proslijedio/la je Tweet
    16. pro 2019.

    A nice write-up on WinAFL setup for fuzzing popular image viewers resulting in quite a few bugs.

    Poništi
  13. proslijedio/la je Tweet

    Shellcoding utilities (pure C) (Kernel : experimental_km branch) (Usermode: master)

    Poništi
  14. proslijedio/la je Tweet
    14. pro 2019.

    The latest release of , the security testing and exploitation framework, is now also available on the Python Package Index (PyPI). $ pip3 install expliot --user Hint: Consider to use a Python venv for the installation

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

    Poništi
  16. proslijedio/la je Tweet

    A simple yet effective implementation of the RunPE technique in VBA. This code can be used to run executables from the memory of Word or Excel. It is compatible with both 32 bits and 64 bits versions of Microsoft Office 2010 and above.

    Poništi
  17. proslijedio/la je Tweet
    14. pro 2019.

    Archive of is now available | All attachments are public | Note that attachments have PHP file extension but are actually archives | Rename according to its file type (ZIP, RAR, ...) and open it | Thanks for everybody who contributed over those ~10 years!

    Poništi
  18. proslijedio/la je Tweet
    13. pro 2019.
    Poništi
  19. proslijedio/la je Tweet
    13. pro 2019.

    Cybercrime group has updated its toolkit by introducing new . The new samples include & bots mainly targeting servers. Technical analysis by :

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet

    Linux: privilege escalation via io_uring offload of sendmsg() onto kernel thread with kernel creds

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·