Tweetovi

Blokirali ste korisnika/cu @sdenbow_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sdenbow_

  1. proslijedio/la je Tweet
    9. sij

    My team is once more hiring vulnerability researchers for our Redmond WA office. This is for low-level OS/platform security research work on Windows and Azure. More details on what we do at . Apply directly at or DM me if interested!

    Poništi
  2. proslijedio/la je Tweet
    3. sij

    Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug:

    Poništi
  3. proslijedio/la je Tweet
    2. sij

    Do you still plan on writing your exploit scripts in elisp^Wpython2? Be ready in a few months to plug in, dial that modem, heap spray some cats, pop some BGP boxes and ~ b l a z e ~ like there's no tomorrow. Rolling big blunts @ 4/20/2020, hacking like it's 4/20/1999.

    Poništi
  4. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  5. proslijedio/la je Tweet

    Read about the implementation of pseudo-random number generation () on Windows 10:

    Poništi
  6. proslijedio/la je Tweet
    28. ruj 2014.

    I’m not tryna go to Microsoft

    Poništi
  7. proslijedio/la je Tweet
    23. lis 2019.
    Poništi
  8. proslijedio/la je Tweet
    19. ruj 2019.

    If you're a hypervisor or kernel developer, don't miss this opportunity to join the Microsoft Hypervisor Engineering team!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    17. kol 2019.

    I wrote a blog post "Breaking Through Another Side: Bypassing Firmware Security Boundaries". It's a first part of the series based on our research with Alexandre Gazet. HW/FW Security != Summary of all Security Boundaries

    Poništi
  10. proslijedio/la je Tweet
    14. kol 2019.
    Poništi
  11. proslijedio/la je Tweet
    10. kol 2019.

    Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    8. kol 2019.
    Poništi
  13. proslijedio/la je Tweet
    23. srp 2019.

    I'm searching for an engineering leader to help shape how Microsoft mitigates security issues and eliminates vulnerabilities. You'll lead a small but growing team, work with groups across the company, and solve tough engineering problems. (1/2)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    2. lip 2019.
    Poništi
  15. proslijedio/la je Tweet
    14. svi 2019.

    Read about how my team updated our side channel vulnerability mitigation architecture, HyperClear.

    Poništi
  16. proslijedio/la je Tweet
    6. svi 2019.

    I wrote an exploit for CVE-2019-9810 to play with BigInts; you can find the sources here: 🍻

    Poništi
  17. proslijedio/la je Tweet
    2. svi 2019.

    I spent some time implementing a toolchain and emulator for a machine with only one possible state. Here's a write-up about spelunking in the turing tarpit:

    Poništi
  18. proslijedio/la je Tweet
    10. tra 2019.

    Growing Hypervisor 0day with Hyperseed by and

    Poništi
  19. proslijedio/la je Tweet
    10. tra 2019.

    Growing Hypervisor 0day with Hyperseed by Shawn Denbow (), Microsoft

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·