Tweetovi

Blokirali ste korisnika/cu @soaphornseuo

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @soaphornseuo

  1. Prikvačeni tweet
    7. ožu 2017.

    Give a man a 0day and he'll have access for a day, teach a man to phish and he'll have access for life.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    30. sij

    A successful reverse binary engineering talk presented by which got an interesting debate going in the room. WiFi hacking/surveillance coming next week by

    Poništi
  3. proslijedio/la je Tweet
    29. sij

    I made a goose that destroys your computer Download it free here:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    28. sij

    A backdoor in a SIEM or how security software can be the key the kingdom. In this case access could be gained to a restricted shell, but still...

    Poništi
  5. proslijedio/la je Tweet
    29. sij

    The more I write code in Rust, the more I wish I was writing it in Go.

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    I wrote about AV as attack surface roughly 7 years ago. I analyzed compiler mitigations 8 years ago and found them lacking.

    Poništi
  7. proslijedio/la je Tweet
    28. sij

    phpMyAdmin 5.0.1 RCE 0-Day by of STEALIEN

    Poništi
  8. proslijedio/la je Tweet
    27. sij

    I created this repo for the people who want to learn about windows logical privilege escalation bugs. You can contact me to add good article which I missed.

    Poništi
  9. proslijedio/la je Tweet
    26. sij

    To find Satan sometimes start with Murphy. In 2007 I became an exploit failure engineer to find 0-days from studying reliability problems. Ep 57 has the story. 📊 🎙️

    Poništi
  10. proslijedio/la je Tweet
    26. sij

    After examining and rereading , MS solution to most Elevation of Privilege (Symbolic\Hard Link) attacks is: Either keeping an open handle to the exploited resource or doing local impersonation correctly. Like in Or in

    Poništi
  11. proslijedio/la je Tweet
    25. sij

    I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.

    Poništi
  12. proslijedio/la je Tweet
    25. sij
    Poništi
  13. proslijedio/la je Tweet
    25. sij

    DEV iBoot + Diags with menu on iPhone 8

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    25. sij

    Facebook rewarded me with a bounty of $30000 for SSRF on prod server (Internal Access 😎).

    Poništi
  15. proslijedio/la je Tweet
    24. sij

    More work on fuzzing using memory as coverage metrics: "MemLock: Memory Usage Guided " (appearing in '20)

    Poništi
  16. proslijedio/la je Tweet
    15. sij

    Our researchers ( and ) successfully reproduced CVE-2020-0601, which is the crypto bug in Microsoft Windows reported by NSA!!

    Poništi
  17. proslijedio/la je Tweet
    25. sij

    I don't know why there two kinds of information disclosure,but there is no bounty for critical of information disclosure.😭

    Poništi
  18. proslijedio/la je Tweet
    23. sij

    Introduction to Triaging Fuzzer-Generated Crashes by Josiah Pierce

    Poništi
  19. proslijedio/la je Tweet
    24. sij

    it's running bounties this morning 💰 الحمد لله. : Stick to one program and test it like no one has tested it before, then keep playing with its features and use your brain to break them. we may have same skills or methodologies but we don't have same brain.

    Poništi
  20. proslijedio/la je Tweet
    23. sij

    What's it like to be CEO at Offensive Security? Ning Wang spoke to Forbes about her experiences and offered a look behind the scenes:

    Poništi
  21. proslijedio/la je Tweet
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·