Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @shamrockhoax
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @shamrockhoax
-
shamrock hoax proslijedio/la je Tweet
So this morning I am reading two papers on graph structuring for decompilation side-by-side: Cifuentes 96 classic (https://www2.cs.arizona.edu/~collberg/Teaching/553/2011/Resources/cifuentes96structuring.pdf …) and the 2015 NDSS DREAM paper. (https://net.cs.uni-bonn.de/fileadmin/ag/martini/Staff/yakdan/dream_ndss2015.pdf …). Both papers are quite good, but ...
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
Full writeup and exploit of Windows kernel ws2ifsl use-after-free (CVE-2019-1215) via
@bluefrostsec and@flxflndy https://labs.bluefrostsecurity.de/blog/2020/01/07/cve-2019-1215-analysis-of-a-use-after-free-in-ws2ifsl/ …pic.twitter.com/XvilzbqrOp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
#pwn2own 2018: Safari +Root exploit https://github.com/ret2/P2O_2018 + paper:https://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:https://github.com/ddz/whatsapp-media-decrypt …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
Here's the bibliography for an automatic exploit generation talk I'm giving tomorrow. If you're looking for a reading list on the topic, this should have almost everything for historical context and state of the arthttps://gist.github.com/SeanHeelan/99b24620c1655495caa2c69693ea72ec …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
[Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
If you're a grad student interested in security/program analysis and looking for something fun, I would love to see someone revisit the APEG problem (posed by Brumley in http://bitblaze.cs.berkeley.edu/papers/apeg.pdf ). There's *at least* one entire PhD worth of problems in that area.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Guess who just became a firetruck?https://twitter.com/ThatEricAlper/status/1220836243778560007 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
The modern query-based architecture for compilers (the pull-model) in addition to just the regular pipeline architecture (the push model) There's a great video about this from a couple of years ago that introduced me to the difference:https://channel9.msdn.com/Blogs/Seth-Juarez/Anders-Hejlsberg-on-Modern-Compiler-Construction …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
New article! Anti-virus Exploitation: Malwarebytes 4.0.4 - Protection Not Found - Hijacking Malwarebytes via COM IPChttps://0x00sec.org/t/anti-virus-exploitation-malwarebytes-4-0-4-protection-not-found-hijacking-malwarebytes-via-com-ipc/18766 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
Earlier today we published the details of a set of vulnerabilities in Safari's Intelligent Tracking Prevention privacy mechanism: https://arxiv.org/abs/2001.07421 . They are... interesting. [1/9]
@kkotowicz@empijei@we1xPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
Windows kernel explorer: A free powerful Windows kernel research toolhttps://github.com/AxtMueller/Windows-Kernel-Explorer …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I got annoyed and created a VS2017 property sheet to help with building Intel Pintools outside of the MyPinTool directory:https://github.com/shamrockhoax/intelpinvsbuild …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL"
Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)
https://repnz.github.io/posts/practical-reverse-engineering/dumping-dpc-queues/ …pic.twitter.com/3lguXVoMAF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
Here’s an IDAPython script that I have been using to populate comments and enum constants for Windows Crypto API. I still need to figure out how to search by constants by name, populate enums with multiple values and add more APIs but it’s still useful.https://gist.github.com/alexander-hanel/3d2fbf9b15d34964416f592b60b47d2e …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
If you’re tired of hearing about crypto32, elliptic curves, and other CVE-2020-0601 shenanigans, have a read over our new blog post on Windows’ Intel CET implementation in the face of SetThreadContext and NtContinue. Come for the exploit mitigation, stay for the XState Internals. https://twitter.com/yarden_shafir/status/1217728223355817986 …pic.twitter.com/rfFlA1aZXR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
Nice RE work of Discord by
@pneumagennao and@CE2Wells and a very interesting result:https://medium.com/tenable-techblog/lets-reverse-engineer-discord-1976773f4626 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
You can download my work freely from GitHub. (sorry, it's only in Spanish)https://github.com/gabimarti/TFM-Analisis-Keyloggers-Ingenieria-Inversa …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
Linux Kernel Runtime Guard (LKRG) bypass collection by Ilya Matveychikov, CC
@Adam_pi3https://github.com/milabs/lkrg-bypass …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
shamrock hoax proslijedio/la je Tweet
We identified significant changes to
#Lazarus attack methodology against#macOS users:
homemade macOS malware
authentication mechanism for next-stage payload
next-stage payload loaded w/o touching the disk
change of Win malware
Details ⇒ https://kas.pr/v4nm pic.twitter.com/CV23eEeG18
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.