Roee Hay

@roeehay

Vulnerability researcher

Singapore  
Vrijeme pridruživanja: kolovoz 2010.

Tweetovi

Blokirali ste korisnika/cu @roeehay

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @roeehay

  1. 4. stu 2019.

    I am attending pacsec this week, DM if you want to meet.

    Poništi
  2. proslijedio/la je Tweet
    22. sij 2018.

    Exploiting Qualcomm EDL Programmers: Memory & Storage based attacks allowing PBL extraction, rooting, secure boot bypassing & bootloader chain debugging/tracing. Multiple Qualcomm based mobile devices affected (5-part blog post)

    Poništi
  3. 23. pro 2017.

    866b2f222b74364021b82bd5ce3ba0beb7646b7e4d2b5fcf88a2a12312e126a9

    Prikaži ovu nit
    Poništi
  4. 23. pro 2017.

    ef37cd57dd4467b3d0f816b1f0ee1e5e5066c39915b6509930a3ba95c5249e79

    Prikaži ovu nit
    Poništi
  5. 23. pro 2017.

    fc0ddbf4e09bb03fcbcefd160041c7f725ad2f91927cce5ad9ef364ceb24069c

    Prikaži ovu nit
    Poništi
  6. 21. pro 2017.

    gcc for aarch64 produced ASR instead of LSR

    Prikaži ovu nit
    Poništi
  7. 21. pro 2017.
    Prikaži ovu nit
    Poništi
  8. 9. stu 2017.

    Nokia 6 Test Points

    Poništi
  9. proslijedio/la je Tweet
    11. lis 2017.

    Project Zero blog: "Over The Air - Vol. 2, Pt. 3: Exploiting The Wi-Fi Stack on Apple Devices" by -

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    11. ruj 2017.

    New UART serial debug cables arrived. Now sleek, sexy, and easier to lose.

    Poništi
  11. proslijedio/la je Tweet
    31. kol 2017.

    Full virtualization of iPhone 6! Restore arbitrary iOS version with JB and debug the kernel with ida! Change the whole game of iOS hacking!

    Poništi
  12. proslijedio/la je Tweet
    30. kol 2017.

    initroot: Exploiting CVE-2016-10277 for untethered jailbreak on Moto devices (USENIX WOOT '17)

    Poništi
  13. proslijedio/la je Tweet

    The Potus system found a bunch of bugs in Linux USB drivers some of which existed since 2002.

    Poništi
  14. proslijedio/la je Tweet
    12. kol 2017.

    abootool - simple tool to dynamically discover hidden fastboot OEM commands based on static knowledge

    Poništi
  15. 12. kol 2017.

    omw to

    Poništi
  16. proslijedio/la je Tweet
    8. kol 2017.

    Please welcome: Tiny cute emulator plugin for IDA based on Supports x86/x64/ARM/ARM64

    Poništi
  17. proslijedio/la je Tweet
    3. kol 2017.
    Odgovor korisnicima i sljedećem broju korisnika:

    Does it blow the secure boot fuse?

    Poništi
  18. proslijedio/la je Tweet
    1. kol 2017.

    [CVE-2017-11105] OnePlus 2 Lack of SBL1 Validation Broken Secure Boot

    Poništi
  19. 29. srp 2017.

    done. next

    Poništi
  20. proslijedio/la je Tweet
    28. srp 2017.

    sandsifter results: secret instructions; bugs in IDA, gdb, VS, valgrind, capstone, qemu; flaws in hypervisors; critical hardware locks; etc.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·