Esteban Guillardoy

@sagar38

Security Researcher

Argentina
Vrijeme pridruživanja: studeni 2007.

Tweetovi

Blokirali ste korisnika/cu @sagar38

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sagar38

  1. proslijedio/la je Tweet
    4. velj

    📢 SUPER NOVEDAD: La va a durar ¡¡CUATRO DÍAS!! 🚨🚨 Miércoles a SÁBADO, porque nos lo merecemos como comunidad. Se vienen cosas muy buenas, esto es solo el comienzo 👊🏼 . BREAKING NEWS: will last FOUR DAYS 🚨🚨 Great things are coming, this is just the beginning 👊🏼

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    24. sij

    Reversing XignCode3 Anticheat - Part 3 is now out! 🥳 Understanding dispatcher functions is fundamental for reversing Windows drivers. Let's see how this Anti-cheat dispatch the IRP requests.

    Poništi
  3. proslijedio/la je Tweet
    17. sij

    is now in public preview. Create slick Azure architecture diagrams for free. Please give it a try! PS: Retweets appreciated. Please help spread the word.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    16. sij

    Reversing XignCode3 Driver – Part 2 – Analyzing init functions Part 2 is online! Understand how the Anticheat Driver inits some custom structures and variables that are later used to dispatch the different IOCTLs.

    Poništi
  5. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  6. proslijedio/la je Tweet
    14. sij

    Hey new followers from the tweet! Here's a quick rundown of some of my performance stuff - all free and open source for your enjoyment! 1/5

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    13. sij

    We are looking for Jr/Sr Application Security Engineers at !!

    Poništi
  8. proslijedio/la je Tweet
    4. sij

    Great tool by : VM Options Explorer, allowing you to search for VM command line options, their default values, descriptions, when they were introduced etc. 👍

    Poništi
  9. proslijedio/la je Tweet
    3. sij

    Want to know more about our upcoming security meetup? Check out this presentation given by at the previous one: Let us know if you want to present yourself a 10-15 min ligthning talk.

    Poništi
  10. proslijedio/la je Tweet
    28. pro 2019.

    Today I found a new, open source tool from Microsoft: etl2pcapng. "Utility that converts an .etl file containing a Windows network packet capture into .pcapng format." Forked it and added code to add a comment to each packet containing the process id (PID)

    Poništi
  11. proslijedio/la je Tweet

    Ratchet rotator. When you don’t have a good access this will help you to tight and also to untight screw. 🖥 🛒

    Poništi
  12. proslijedio/la je Tweet

    Calling bounty hunters: Help us secure open source, and get rewards: Write a CodeQL query that finds multiple vulns. Or write a query that identifies a class of vulns with a high precision and get it merged into the CodeQL default query set.

    Poništi
  13. proslijedio/la je Tweet
    26. pro 2019.

    If you’re looking for a technically strong, small boutique security consulting firm you should talk to

    Poništi
  14. proslijedio/la je Tweet
    20. pro 2019.

    Definitive Guide To Switch Expressions In 13, via .

    Poništi
  15. proslijedio/la je Tweet
    20. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    20. pro 2019.

    My slides on "Unveiling the Underground Word of Anti-Cheats" are now available on the site. You can find additional information about bypasses to multiple Anticheats (new info at the end)

    Poništi
  17. proslijedio/la je Tweet
    19. pro 2019.

    Slides de la charla "Lo que nadie te dijo de migrar a Python 3" que dimos con en : CC

    Poništi
  18. proslijedio/la je Tweet
    19. pro 2019.

    Announcing Faraday v3.10 📢 We’ve migrated our Platform to Python 3 But that's not all: we have included remote agent parameters and improvements for plugin processes's performance Full information:

    Poništi
  19. proslijedio/la je Tweet
    19. pro 2019.

    Want to learn about how to write a Java agent from scratch? I wrote this introduction for the Java advent calendar.

    Poništi
  20. proslijedio/la je Tweet
    12. pro 2019.

    When auditing Ruby on Rails apps, always search for <name>.js.erb views files. There is a stupid pattern called "Server-generated JavaScript Responses" which is a way to bypass SOP and inject content via JavaScript files (just like JSONP) which leads to XSSI.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·