Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @romanwagnr
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @romanwagnr
-
Roman proslijedio/la je Tweet
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage: https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
Slides + recording of my
#36c3 talk: https://saelo.github.io/presentations/36c3_messenger_hacking.pdf … https://media.ccc.de/v/36c3-10497-messenger_hacking_remotely_compromising_an_iphone_through_imessage … had to omit many details, but blogpost coming soon!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
Mobile Application Pentesting : Part 1:- https://medium.com/@patilpiyush/mobile-application-pentesting-part-1-596e82e56e83 … Part 2:- https://medium.com/@patilpiyush/mobile-application-pentesting-part-2-feda7659eb12 … Part 3:- https://medium.com/@patilpiyush/mobile-application-pentesting-part-3-a9acbb487e6 … Part 4:- https://medium.com/@patilpiyush/mobile-application-pentesting-part4-329ca80b8e4b … Part 5:- https://medium.com/@patilpiyush/mobile-application-pentesting-part-5-3c83e7f4dfe7 … Part 6:- https://medium.com/@patilpiyush/mobile-application-pentesting-part6-542870ffc5f7 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
New blogpost: Sanitized Emulation with QEMU-AddressSanitizer https://andreafioraldi.github.io/articles/2019/12/20/sanitized-emulation-with-qasan.html … I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
I'm really excited about this video. It has been in the making for a long time. It's a video with
@NedWilliamson about his SockPuppet vulnerability in the XNU (iOS/Mac) Kernel and was used for jailbreaking. Haxember #10 https://www.youtube.com/watch?v=YV3jewkUJ54 …pic.twitter.com/c2jbwDUVrx
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
v2 of my free Intro to Android App Reverse Engineering workshop is here!
I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!
http://maddiestone.github.io/AndroidAppRE pic.twitter.com/0iPNoJ3p7y
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
Here are the slides for the
#botconf2019 talk by me on DeStroid in automatically deobfuscate encrypted strings in Android malware. Including some bonus slides:)https://github.com/fkie-cad/DeStroid/blob/master/DeStroid_bonus_slides.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).https://github.com/axi0mX/ipwndfu
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
Writeup for
#QEMU VM Escape found by our team member@vishnudevtj : https://blog.bi0s.in/2019/08/20/Pwn/VM-Escape/2019-07-29-qemu-vm-escape-cve-2019-14378/ … In the writeup, Vishnu describes how he found and exploited CVE-2019-14378 that was a pointer miscalculation bug in network backend of QEMU to get code execution!#Exploitationpic.twitter.com/TzvSWZ9W67Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
Project Zero's tracking sheet for zero-day exploits that were detected "in the wild": https://googleprojectzero.blogspot.com/p/0day.html
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
Pentesting Cheatsheets - Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs : https://ired.team/offensive-security-experiments/offensive-security-cheetsheets … cc @kondencuotas
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
Announcing my very own free, open source and online course: "Reverse Engineer iOS Applications"
My favourite personal project yet. It was a lot of fun and hard work but I hope it'll help drive more researchers to mobile security. Feedback always welcomehttps://ivrodriguez.com/announcing-my-own-course-reverse-engineer-ios-applications/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
I never thought I would experience a XSS on Google Search. But
@kinugawamasato blew my mind! This is a video going over the difficulties of sanitizing HTML in JavaScript. https://www.youtube.com/watch?v=lG7U3fuNw3A …pic.twitter.com/EwoM0GaW3o
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
RCE on Steam Client via buffer overflow in Server Info by
@0xACB and vinnievan. Full report here: https://hackerone.com/reports/470520 ($18,000 bounty)pic.twitter.com/b0Zpbw6yfLHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
Translating: mmap_min_addr bypass means that hundreds of NULL-derefs in Linux kernel that usually treated as "local DoS in Linux, who cares?" now suddenly become easily exploitable So if you don't have the fix your kernel is subject to 100s of exploits eg: https://syzkaller.appspot.com/#upstream-open https://twitter.com/a13xp0p0v/status/1103729052236611586 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
For your enjoyment, here are 242 Linux kernel crashes from the Syzkaller crash database reproduced and recorded in PANDA (165GB): http://pompeii.mit.edu/~moyix/syzkaller_crashes_panda/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
Slides for my "Coverage-guided USB Fuzzing with Syzkaller" talk
@offensive_conhttps://docs.google.com/presentation/d/1z-giB9kom17Lk21YEjmceiNUVYeI6yIaG5_gZ3vKC-M/edit?usp=drivesdk …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
#BugBounty#bugbountytip#BugBountyTips#infosec#XSS Here is my obfuscated payload. It bypasses lots of WAF, including CloudFlare iirc. <iframe src="%0Aj%0Aa%0Av%0Aa%0As%0Ac%0Ar%0Ai%0Ap%0At%0A%3Aalert(0)"> iFrame with javascript URI payload. Line feeds [CRLF] obfuscate it.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je Tweet
ClusterFuzz, an infrastructure used for fuzzing Chrome and OSS-Fuzz, is open source now! Enjoy responsibly :) Blog: https://opensource.googleblog.com/2019/02/open-sourcing-clusterfuzz.html … Code: https://github.com/google/clusterfuzz …
#fuzzing#chrome#oss#security#clusterfuzzHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Roman proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.