Tweetovi

Blokirali ste korisnika/cu @srlkhmi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @srlkhmi

  1. Prikvačeni tweet
    30. ožu 2019.
    Poništi
  2. proslijedio/la je Tweet
    16. sij

    If you are a student and in Bengaluru i would highly recommend attending this meetup. Team bios has been making India proud at international level in information security space. Keep up the good work folks

    Poništi
  3. proslijedio/la je Tweet
    16. sij

    If you are looking for a platform to share experiences in your cyber security journey or to get perspectives from industry experts, we believe this will be a best platform. We would take this opportunity to invite you all to the first meet up and urge you to give a talk.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    16. sij

    We are excited to announce bi0s meetup that will be organised at Amrita Vishwa Vidyapeetham, Bengaluru on 8th February! The primary focus is to promote security education and awareness. The meetup is open and free for all! More information at .

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet

    "Attack Surface Analysis Using Threat Model" by . The talk was really informative on how threat modelling is used to detect the potential threats after the design phase of an application. Combination of both Software Engineering and Security.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    26. pro 2019.

    Ladies take notes! Met this girl online YESTERDAY, and she’s already trying to learn more about me, not just hook up. It’s called conversation. Learn it.

    Poništi
  7. proslijedio/la je Tweet
    27. pro 2019.

    Proud to Introduce our Sponsors for InCTF 2019! Bronze sponsor: VMware India Find more about at

    Poništi
  8. proslijedio/la je Tweet
    23. pro 2019.

    Proud to announce the list of speakers and their talks for InCTF 2019. Can't wait to meet and learn from these elite cybersecurity professionals!

    Poništi
  9. proslijedio/la je Tweet

    Gathered some of my proof-of-concepts and analysis notes on zero day vulnerabilities that I discovered or researched in the past few years, on my github: . Enjoy

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    10. kol 2019.

    Just wrote a big-ass Tutorial / Write-up on how to get ROOT and Escape Sandbox with tfp0 when you try to make your own iOS 12.x Jailbreak:

    Poništi
  11. proslijedio/la je Tweet
    17. srp 2019.

    Here we go! My first VM Escape in qemu with default configuration. Will publish the exploit and more details when its fixed. Thanks and for the inspiration and support !

    Poništi
  12. proslijedio/la je Tweet
    22. svi 2019.

    Took a while -2019-0708

    Poništi
  13. proslijedio/la je Tweet
    29. tra 2019.

    Ever wanted to take a look at the crypto code that ships in Windows? SymCrypt is now open source:

    Poništi
  14. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    17. tra 2019.

    A new blog post, bypassing an anti-debug check on Windows without hooking, digging into some internals and musing on where everything has gone wrong :-)

    Poništi
  16. proslijedio/la je Tweet
    3. tra 2019.

    Here's a generic local ASLR bypass for all setuid binaries for Linux kernels < 4.8. Details:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    3. tra 2019.

    Apache Local Root: CVE-2019-0211: Vulnerability description. Exploit will come later.

    Poništi
  18. proslijedio/la je Tweet
    28. ožu 2019.

    Part 2 of my Heap Exploitation series is finished! ✨ Part 2: Understanding the Glibc Heap: Free, Bins, Tcache: In case you missed Part 1: Understanding the Glibc Heap - Overview and Allocation Strategies:

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    15. ožu 2019.

    "Pwning Mobile Apps Without Root or Jailbreak" slides from CureCon 2018, enjoy!

    Poništi
  20. proslijedio/la je Tweet
    12. ožu 2019.

    More fuzzing-related research ! :D Fuzzing of isolated functions from LLVM IR using AFL + ASAN + KLEE22. Results looks nice ! Cc

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·