Tweetovi

Blokirali ste korisnika/cu @runixd

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @runixd

  1. proslijedio/la je Tweet

    in 1940, cryptologist Marian Rejewski broke the Enigma code in the presence of Alan Turing during their meeting in Paris.

    Poništi
  2. proslijedio/la je Tweet
    7. sij
    Poništi
  3. proslijedio/la je Tweet
    28. pro 2019.

    Our 36c3 presentation video : and slides: 😃 It's really a nice party. Hope to see you next year.

    Poništi
  4. proslijedio/la je Tweet
    4. lis 2019.
    Poništi
  5. proslijedio/la je Tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    24. ruj 2019.

    IE9/IE11 Vulnerability advanced exploitation: PoC+slides on how to bypass ASLR+DEP to exploit IE9-IE11 successfully

    Poništi
  7. proslijedio/la je Tweet
    15. ruj 2019.
    Poništi
  8. proslijedio/la je Tweet
    9. ruj 2019.

    GrapheneOS is the continuation of the project formerly known as CopperheadOS. GrapheneOS is open source and is in the process of being properly revived and moved forward.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    4. ruj 2019.

    Richard Stallman is giving a talk at Microsoft campus. If the world ends today, you know why. – mjesto: Microsoft Corporation

    Poništi
  10. proslijedio/la je Tweet
    2. ruj 2019.

    Have y'all had a chance to go see the videos for the candidates for the board of directors? Here's video!

    Poništi
  11. proslijedio/la je Tweet
    29. kol 2019.

    thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    28. kol 2019.

    In the vein of sharing pieces of my toolset, here's another one: a super thin PE loader for Linux, based on the pe-parse library. Worked for the Windows font subsetter, may work for other self-contained DLLs.

    Poništi
  13. proslijedio/la je Tweet

    CVE-2019-12527: Code Execution on Squid Proxy Through a Heap Buffer Overflow - the Trend Micro Research team provides details about this recently patched vuln.

    Poništi
  14. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    17. kol 2019.

    I wrote a blog post "Breaking Through Another Side: Bypassing Firmware Security Boundaries". It's a first part of the series based on our research with Alexandre Gazet. HW/FW Security != Summary of all Security Boundaries

    Poništi
  16. proslijedio/la je Tweet
    19. kol 2019.
    Poništi
  17. proslijedio/la je Tweet
    15. kol 2019.

    Summary of last Patch Tuesday: • 8 bugs in the Microsoft FontSub.dll library, • 2 bugs in AFDKO when converting documents in Adobe Acrobat, • 10 bugs in PDF rendering in Adobe Reader (mostly fonts and JP2K). Details and PoCs in the tracker:

    Poništi
  18. proslijedio/la je Tweet

    I'm publishing some 🔥 research today, a major design flaw in Windows that's existed for almost *two decades*. I wrote a blog post on the story of the discovery all the way through to exploitation.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    10. kol 2019.

    Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·