Tweetovi

Blokirali ste korisnika/cu @shigureJ_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @shigureJ_

  1. 18. sij

    hate to see it, two for the price of one😳

    Poništi
  2. proslijedio/la je Tweet

    Security Advisory - Microsoft Guidance on Scripting Engine Memory Corruption - for more information please visit:

    Poništi
  3. proslijedio/la je Tweet
    16. sij

    Very much looking forward to this talk: "Hypervisor-level malware monitoring and extraction system - current state and further challenges" with DRAKVUF !

    Poništi
  4. proslijedio/la je Tweet

    We have increased our Microsoft Edge bounty awards alongside today's general availability of the new Microsoft Edge. Find out more here:

    Poništi
  5. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  6. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    9. sij

    Remote iPhone Exploitation Part 1: Poking Memory via iMessage and CVE-2019-8641

    Poništi
  8. proslijedio/la je Tweet
    2. sij
    Odgovor korisniku/ci

    See also: Uninformed vol. 6, "locreate: an anagram for relocate" by

    Poništi
  9. proslijedio/la je Tweet
    28. pro 2019.

    Our 36c3 presentation video : and slides: 😃 It's really a nice party. Hope to see you next year.

    Poništi
  10. proslijedio/la je Tweet

    [CPR-Zero] CVE-2019-1286 (Windows Kernel): Null Pointer Dereference in the AlphaBlend function in win32kfull.sys

    Poništi
  11. proslijedio/la je Tweet
    25. pro 2019.

    CMPTSC - Compare Timestamp With Christmas

    Poništi
  12. proslijedio/la je Tweet
    22. pro 2019.

    Another small project: I made a toy SIMD superoptimizer in ~100 lines of Python using x86-sat. It's not particularly smart about managing the search space, but it's found a couple cool things so far.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    21. pro 2019.

    Pwning VMWare, Part 1: RWCTF 2018 Station-Escape

    Poništi
  14. proslijedio/la je Tweet
    20. pro 2019.

    Interested in Smart TV hacking but don't know where to start? We've done all the legwork for you on the Samsung Q60 TV by

    Poništi
  15. proslijedio/la je Tweet
    20. pro 2019.

    We just updated the executive callback repo with a research on the callback used by PatchGuard

    Poništi
  16. proslijedio/la je Tweet
    20. pro 2019.

    By far my most favorite stream I've done to date! I'd argue that with this tooling I now have some of the best Intel micro-architecture introspection tooling in the world! Definitely will warrant a blog shortly

    Poništi
  17. proslijedio/la je Tweet
    18. pro 2019.

    A recent result: deobfuscation via relational abstract interpretation

    Poništi
  18. proslijedio/la je Tweet
    17. pro 2019.
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    11. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    10. pro 2019.

    Kernel debugger data block decoding is a few harder in Windows 10 20H1, because KiWaitNever and KiWaitAlways, which are used for decyphering KDBG, are placed in unexported nt!KiSetTimerEx function, instead of exported KeSetTimerEx in previous versions of Windows 10.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·