Tweetovi

Blokirali ste korisnika/cu @scwuaptx

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @scwuaptx

  1. proslijedio/la je Tweet
    27. sij

    New cache attack against Intel CPUs:

    Poništi
  2. proslijedio/la je Tweet
    24. sij

    🎉 it's Chinese New Year's Eve! so we're going to release some new challenges! 8 new challenges will be unlocked on UTC 2019-01-26 04:00

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    14. sij

    Nice of Microsoft to add telemetry for -2020-0601, they are expecting exploitation New Function in crypt32.dll - ChainLogMSRC54294Error CveEventWrite(L"[CVE-2020-0601] cert validation", v8);

    Poništi
  4. proslijedio/la je Tweet

    再び総統としての重責を託されたのは、国民が私にこれまで以上にリーダーシップを発揮し、未来を見据えた政策を実践することで、台湾をさらに邁進させたいからだとおもいます。 そのため、国民の声に謙虚に向き合い、不動の心で困難を乗り越え、そして、同様に台日の絆を深めていきたいです!

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  7. 31. pro 2019.

    Happy New Year !

    Poništi
  8. proslijedio/la je Tweet
    29. pro 2019.

    Let's capture the fortune once again! Hope everyone enjoyed our hacker party. See you next year. Yo

    Poništi
  9. proslijedio/la je Tweet
    23. pro 2019.

    Ever wondered what makes a CTF challenge good? I've asked myself that many times. I wrote this to help me answer that question based on discussions with others in the community

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    17. pro 2019.
    Odgovor korisnicima

    Heap disclosure in Windows libc for effectively forever. Reachable from some scripting languages too by using a similar code pattern:

    Poništi
  11. proslijedio/la je Tweet
    16. pro 2019.

    HITCON CTF Finals 2019 The Fortune This is the final result of HITCON CTF congratulations to Tea Deliverers, LC↯BC, TokyoWesterns ! And all the teams ! you are amazing ! What will we capture next year ?

    Poništi
  12. proslijedio/la je Tweet
    15. pro 2019.

    HITCON CTF 2019 Final Score

    Poništi
  13. proslijedio/la je Tweet
    30. stu 2019.

    Here is a recent writeup that I did. It's not as indepth as I want. I'll write a definitive guide for hunting these bugs starting with 0 knowledge when I'm home in a few weeks. I'll also upload all my pocs to github, including recent bugs. I'm pissed. Bye

    Poništi
  14. proslijedio/la je Tweet
    13. stu 2019.

    Another win32k pointer leak, this time it's more fun :) Enjoy:

    Poništi
  15. proslijedio/la je Tweet
    8. stu 2019.

    Released to go with my talk, a project which contains a C# client for almost every ALPC RPC server on Windows 7 through Windows 10 1909. Could be useful for EoP research, fuzzing etc.

    Poništi
  16. 31. lis 2019.

    🎃 Trick or treat 🎃 (@ Shibuya Crossing in 渋谷区, 東京都)

    Poništi
  17. proslijedio/la je Tweet
    30. lis 2019.

    嫁ではありませんのでここで説明いたします。妹です。

    Poništi
  18. 27. lis 2019.

    :) (@ 成田國際機場 in 成田市, 千葉県)

    Poništi
  19. proslijedio/la je Tweet
    23. lis 2019.

    We added AddressSanitizer (ASan) support to MSVC in the latest Visual Studio preview. So now you can not only use it for applications targeting Linux from VS, but Windows too, to find runtime memory issues fast:

    Poništi
  20. proslijedio/la je Tweet
    22. lis 2019.

    Published the write-up of PoE - Path of Exploitation for HITCON CTF! Includes why and how I designed these challenges and how to exploit from the userspace program, the kernel, to QEMU!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·