Tweetovi

Blokirali ste korisnika/cu @sh3llgh0st

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sh3llgh0st

  1. proslijedio/la je Tweet
    27. sij

    A few more efficient fuzzers has already been added to list . Check Thanks to van Hauser

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    18. sij

    RPISEC RE/VR Courses: Secure Software Principles , Malware Analysis , Advanced Exploitation and Rootkit Development , Program Obfuscation ,Windows Exploitation , Hardware Reverse Engineering , Modern Binary Exploitation , Malware Analysis: cr

    Poništi
  3. proslijedio/la je Tweet
    18. sij
    Poništi
  4. proslijedio/la je Tweet
    Poništi
  5. proslijedio/la je Tweet
    14. sij

    ...and CERT's take on CVE-2020-0601: Crypt32.dll fails to validate ECC certificates in a way that properly leverages protections that ECC should provide. As a result, an attacker may be able to craft a certificate that appears to have the ability to be traced to a trusted root CA

    Poništi
  6. proslijedio/la je Tweet
    15. stu 2019.

    Awesome-AFL : A curated list of different AFL forks and AFL inspired with detailed equivalent academic papers with AFL-fuzzing tutorials

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    13. sij

    Sources say Microsoft on Tuesday will fix an extraordinarily scary flaw in all Windows versions, in a core cryptographic component that could be abused to spoof the source of digitally signed software. Apparently DoD & a few others got an advance patch

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    11. sij

    Excess XSS: A comprehensive tutorial on cross-site scripting

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    9. sij

    Do you struggle to understand in environment ? This new article may help clarify things by simply explaining how Kerberos works. It is the first of a serie of posts about attacking Active Directory. Stay tuned 🙃

    Poništi
  10. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  11. proslijedio/la je Tweet
    10. sij

    Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·