Stefan Nicula

@stefan_nicula

Threat Researcher, Penetration Tester, PhD student | Interested in reverse engineering, binary exploitations & low-level stuffs

Vrijeme pridruživanja: listopad 2015.

Tweetovi

Blokirali ste korisnika/cu @stefan_nicula

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @stefan_nicula

  1. proslijedio/la je Tweet
    31. sij

    Yearly reminder that by is awesome sauce 👌

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Paper Review for CacheOut is now up on YouTube! It's 2 parts totaling 11 hours, have fun!

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    I could listen to Henry Cavill talk about swords all day...

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    27. sij

    Interested in learning Windows Kernel exploitation ? wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.

    Poništi
  7. proslijedio/la je Tweet
    20. sij

    The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr as Hypervisor From Scratch could never have existed without his help and to Alex for patiently answering my questions.

    Poništi
  8. proslijedio/la je Tweet
    20. sij

    Friends, I am pleased to announce I have finished our zines collection! We've added: -doomriderz -inception -Immortal Riot -matrix -rRlf -VLAD All really cool stuff. All have absolutely incredible work. Check them out here: 1luv -smelly__vx

    Poništi
  9. proslijedio/la je Tweet
    17. sij

    My blog post about CVE-2020-0601 is online! I hope you guys enjoy it, I didn't sleep for 2 days now, pardon me if I made some mistakes :) Feel free to point out any mistakes!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  11. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    13. sij
    Poništi
  13. proslijedio/la je Tweet
    8. sij

    How infosec works:

    Poništi
  14. proslijedio/la je Tweet

    The first episode of podcast is live! Enjoy! ♥️⚔️🐺

    Poništi
  15. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  16. proslijedio/la je Tweet
    3. sij

    Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug:

    Poništi
  17. proslijedio/la je Tweet
    2. sij

    So, it's been a while since I posted on my blog, but I had some spare time over the holidays to do a write up on reversing 's VM1 challenge and writing a custom VM interpreter for it, as well as incorporating YARA into it! Check it out!

    Poništi
  18. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    29. pro 2019.

    Open source RAT collection, and malicious RAT analysis reports.

    Poništi
  20. proslijedio/la je Tweet
    16. pro 2019.

    A nice write-up on WinAFL setup for fuzzing popular image viewers resulting in quite a few bugs.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·