RET2 Systems

@ret2systems

We strive to reimagine vulnerability research, program analysis, and security education as it exists today.

Troy, NY
Vrijeme pridruživanja: lipanj 2017.

Tweetovi

Blokirali ste korisnika/cu @ret2systems

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ret2systems

  1. proslijedio/la je Tweet
    prije 18 sati

    Looking forward to using this Yeti thermos. Awesome prize for completing their RE/exploitation challenge at

    Poništi
  2. 1. velj

    There are 20 bottles left at our 2020 booth heist! Finish up your exploit soon, because we are on track to run out of bottles by the end of the day.

    Poništi
  3. proslijedio/la je Tweet
    22. sij

    🌪Announcement🌪 We're excited to announce that Amy Burnett () of RET2 Systems is one of our upcoming speakers at !

    Poništi
  4. proslijedio/la je Tweet
    20. sij

    Been waiting to announce: I'll be presenting "Forget the Sandbox Escape: Abusing Browsers from Code Execution" at this year's BluehatIL This talk will look at what attacks you can pull off in browsers without needing a sandbox escape I will also be demoing a POC of persistence

    Poništi
  5. 13. sij

    We're sponsoring again this year, and we'll be giving away RET2 laser etched bottles to the first 50 hackers who solve our binary exploitation challenge at the conference!

    Poništi
  6. proslijedio/la je Tweet
    5. pro 2019.

    Just registered for this course. Really looking forward to it. 🙃💻

    Poništi
  7. proslijedio/la je Tweet
    5. pro 2019.

    Excited to announce that I will also be running my advanced browser exploitation training at Ringzer0 next year!

    Poništi
  8. proslijedio/la je Tweet
    11. stu 2019.

    This year we will be giving away 8 free tickets to different offensivecon trainings for alumni of . Big shout to all the trainers that have donated a few spots in their classes!

    Poništi
  9. proslijedio/la je Tweet
    9. stu 2019.

    I had an incredible week at 's Browser Exploitation training taught by and co. The best and most advanced training course I've ever taken, I'd recommend it to any offensive researchers. Yesterday we took a Chrome V8 JIT n-day from PoC to RCE, awesome.

    Poništi
  10. 7. lis 2019.

    Amy will teach you the techniques to master JavaScript and Just-In-Time Compiler internals and vulnerabilities at her 2020 Browser Exploitation Training! Only a few seats left!

    Poništi
  11. proslijedio/la je Tweet
    19. ruj 2019.

    Thank you for that wonderful RE and BINEXP course. You really built my knowledge and confidence.

    Poništi
  12. proslijedio/la je Tweet
    6. ruj 2019.

    Also super excited to announce that I'll be leading my advanced browser training at OffensiveCon 2020! I had a lot of people asking for me to bring it to Europe so here's your chance!

    Poništi
  13. proslijedio/la je Tweet
    6. ruj 2019.

    Start your engines! browser exploitation training at OffensiveCon.

    Poništi
  14. proslijedio/la je Tweet
    28. kol 2019.

    Just to be clear, your coins are safe -- this has been fixed for ~1 year. :) Thanks for the disclosure and writeup, RET2!

    Poništi
  15. 28. kol 2019.

    We abused a well-defined web standard to exploit a popular cryptocurrency daemon through your browser. Who is up for a little digital heist? ¯\_(ツ)_/¯

    Poništi
  16. proslijedio/la je Tweet
    26. kol 2019.

    Updated 's code coverage tool for TTD to output drcov format for Lighthouse.

    Poništi
  17. 15. kol 2019.

    Our November training on ubiquitous browser exploitation has 14/20 seats filled. Early bird pricing will be ending tomorrow, August 16th. Join us for a week, and we'll teach you how to make every click risky:

    Poništi
  18. proslijedio/la je Tweet
    23. srp 2019.

    If you want to learn how to pwn browsers like this: we just announced a second advanced browser exploitation training that I will be leading this fall Come learn a crazy amount about JavaScript internals and exploitation techniques!

    Poništi
  19. proslijedio/la je Tweet
    23. srp 2019.

    This group does great work, if you are willing and can attend, you should.

    Poništi
  20. 23. srp 2019.

    This fall we'll be hosting another public 5-Day security training on advanced browser exploitation. Learn to identify and exploit contemporary vulnerabilities in the leading browsers. November 4 - 8. Troy, New York Register at the link below:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·