Tweetovi

Blokirali ste korisnika/cu @rick2600

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rick2600

  1. proslijedio/la je Tweet
    30. sij
    Poništi
  2. proslijedio/la je Tweet
    25. sij

    Memory Management Reference

    Poništi
  3. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  4. proslijedio/la je Tweet
    5. sij

    Consider: millions of years ago our antecedents gave a massive sacrifice of their left hemisphere. We lost a tremendous amount of short term memory and replaced it with Broca’s, Wernicke & the phonological loop. But why? So we can—talk. Thus chimpanzees can do this—we can’t:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  6. 20. pro 2019.
    Poništi
  7. 15. pro 2019.
    Poništi
  8. proslijedio/la je Tweet
    11. pro 2019.
    Poništi
  9. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  10. 30. stu 2019.
    Poništi
  11. proslijedio/la je Tweet
    15. stu 2019.

    Paged Out! #2 Thanks to all the authors and the institute! Enjoy!

    Poništi
  12. proslijedio/la je Tweet

    Estamos mexendo com gente perigosa. É hora de proteger o que nós – todos nós – ainda temos de mais valioso nesse país. por

    Poništi
  13. Poništi
  14. proslijedio/la je Tweet
    28. lis 2019.
    Poništi
  15. proslijedio/la je Tweet
    26. lis 2019.

    While reverse engineering a rootkit sample (That I soon will publish about 😉) I saw this weird compiler optimization. I thought I'll start documenting compiler optimizations for reverse engineers. Read my first article in the series:

    Poništi
  16. proslijedio/la je Tweet
    7. lis 2019.
    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    8. ruj 2019.
    Poništi
  18. proslijedio/la je Tweet
    28. kol 2019.

    Mathematics for Computer Science (via ⁦⁩)

    Poništi
  19. proslijedio/la je Tweet

    Side-by-side comparison of different Application Security Testing approaches

    Poništi
  20. proslijedio/la je Tweet

    Um desejo para este domingo, by

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·