Sascha Schirra

@s4sh_s

Let there be

Castrop-Rauxel, Germany
Vrijeme pridruživanja: lipanj 2014.

Tweetovi

Blokirali ste korisnika/cu @s4sh_s

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @s4sh_s

  1. proslijedio/la je Tweet
    19. sij

    A great Windows 10 heap grooming and exploitation blog post by in case you missed it last year:

    Poništi
  2. proslijedio/la je Tweet
    15. sij

    Work with me in the awesome appsec team:

    Poništi
  3. proslijedio/la je Tweet
    10. sij

    Mein Studium neigt sich dem Ende zu. Ich suche ab März/April eine IT Security Vollzeitstelle. Entry/intermediate Position. Penetration Testing/Blue Team/SOC/Security+Sysadmin/Security Foo Raum Wien || remote Über Tipps & Angebote bin ich dankbar. DMs open. RT erwünscht. Danke

    Poništi
  4. proslijedio/la je Tweet
    7. sij
    Poništi
  5. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  6. proslijedio/la je Tweet
    7. sij

    I am looking for new projects (cologne or remote) as a software developer. My main focus is on low level embedded stuff (, , , android firmware, little bit kernel dev) but I have also experiences in enterprise stuff and . CV:

    Poništi
  7. proslijedio/la je Tweet
    6. sij

    Considering to move within Berlin. Looking for 2-3+ rooms. If anybody happens to know a landlord with an apartment coming up the next few months, please think of me.

    Poništi
  8. proslijedio/la je Tweet
    4. sij

    Just wrote an article about how I found a new Remote Command Execution 0-day (CVE-2019-15029) in Pandora FMS v7.0NG monitoring software I Found it by performing a static code analysis and finally wrote a python exploit for it.

    Poništi
  9. proslijedio/la je Tweet
    3. sij

    Reverse Engineering Encrypted Code Segments: by Ryan Cornateanu

    Poništi
  10. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  11. proslijedio/la je Tweet
    26. pro 2019.

    New blogpost: Sanitized Emulation with QEMU-AddressSanitizer I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    20. pro 2019.
    Poništi
  13. proslijedio/la je Tweet
    13. pro 2019.

    from battlefield: Found Slack key and do not know what to do? Start instance (or any browser payload) and use to invite users to go on your link to get free gifts. Don't forget to spoof user+send message on every chan ;)

    Poništi
  14. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  15. proslijedio/la je Tweet
    16. ruj 2019.

    Super excited to finally release SVD-Loader for Ghidra: A tool to make bare-metal ARM firmware reverse-engineering much easier by automatically annotating all peripherals - for over 650 different microcontrollers!

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    12. pro 2019.

    Good news! Stalker is now ready for fuzzing and my frida-fuzzer is ready to fuzz APIs of Android apps. With a logic inspired by AFL, it has a libFuzzer-like harness interface. The project is in his early stage, look at the TODOs to contribute.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    12. pro 2019.

    You can now install Miasm using "pip install miasm" ! See

    Poništi
  18. proslijedio/la je Tweet
    12. pro 2019.

    Had to take a longer break from P4wnP1 development this year. Here's a small excuse: My talk on exploitation of Logitech wireless input devices ... and yes, it includes air gap bridging once more

    Poništi
  19. proslijedio/la je Tweet
    10. pro 2019.

    Quick recap in English: was asked to check the security of a doctors office. We found issues like unauth remote updates of a software managing patient data (the 90s are calling). When reported to the vendor, the first response was denial, then lawyers.

    Poništi
  20. proslijedio/la je Tweet
    4. pro 2019.

    Dump AES keys from wireless Logitech receivers using Chrome Browser. Demo page: Source:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·