Stephen Fewer

@stephenfewer

Software vulnerabilities, reverse engineering and consultancy .

Ireland
Vrijeme pridruživanja: ožujak 2009.

Tweetovi

Blokirali ste korisnika/cu @stephenfewer

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @stephenfewer

  1. Prikvačeni tweet
    28. ožu 2019.

    Sneak peek of the upcoming v3 multi arch decompiler! Public beta happening soon and general release later this year \o/

    Poništi
  2. proslijedio/la je Tweet
    5. velj

    Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from 2019:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    3. velj

    Latest Relyze v3 beta build is available, adding arm64 support and several bug fixes:

    Poništi
  4. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  5. proslijedio/la je Tweet
    15. pro 2019.
    Poništi
  6. proslijedio/la je Tweet
    6. pro 2019.

    A new Relyze v3 beta build is available! Decompiler gets a mini map overview and local cross references navigation. Plugin framework now supports custom binary loaders, and lots of bug fixes :

    Poništi
  7. proslijedio/la je Tweet
    15. stu 2019.

    Paged Out! #2 Thanks to all the authors and the institute! Enjoy!

    Poništi
  8. proslijedio/la je Tweet

    I'm publishing some 🔥 research today, a major design flaw in Windows that's existed for almost *two decades*. I wrote a blog post on the story of the discovery all the way through to exploitation.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    10. kol 2019.

    Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    23. srp 2019.

    Fuzzilli finally has a decent type system: this should simplify tuning fuzzilli to target (or omit) specific builtins, methods, or properties and should improve the correctness rate a bit as well. Will also hopefully enable more cool stuff in the future =)

    Poništi
  11. 13. srp 2019.

    Nice intro to 's new JavaScript engine Hermes, which was recently open sourced:

    Poništi
  12. proslijedio/la je Tweet

    No info leak, no ROP, no shellcode? No problem! describes his no shellcode exploit of a write-what-where vulnerability in . Details at

    Poništi
  13. proslijedio/la je Tweet
    10. svi 2019.

    Project Zero guest blog: "Trashing the Flow of Data" by Stephen Röttger () -

    Poništi
  14. proslijedio/la je Tweet
    4. tra 2019.

    The Relyze 3 Beta is out! () Featuring an early preview of our new x86, x64 and ARM decompiler and licensing changes.

    Poništi
  15. proslijedio/la je Tweet
    4. tra 2019.

    We just published our updated fork of the Udis86 disassembler library () which adds several new ISA extensions, as well a new library to translate native ARM, AArch64, x86 and x64 code into TCG based IR ()

    Poništi
  16. proslijedio/la je Tweet
    20. ožu 2019.

    Fuzzilli, my JavaScript engine fuzzer, is now open source: \o/ Keep an eye on the Project Zero bugtracker in the next few weeks for some of the bugs found with it. Also let me know if you encounter any problems when using it! :)

    Poništi
  17. proslijedio/la je Tweet
    17. velj 2019.

    Here are the slides from my talk about my approach for JavaScript engine fuzzing: My master's thesis (for which I developed the fuzzer) can be found here: Thanks for the great conference ! =)

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    2. sij 2019.

    Happy 2019: Metasploit dev has a deep dive on developing exploits for three vulns leveraged by the Morris Worm—which, as players may remember, was the inspiration for his Cuckoo's Egg-themed CTF challenge this past year.

    Poništi
  19. proslijedio/la je Tweet
    2. sij 2019.

    unauth, unassoc remote code exec on the Marvell Avanstar Wifi chip SoC used in Playstations, Xbox, Surfaces, Chromebooks, Samsung phones and more in under five minutes attack time. Bonus second stage escalation in the linux drivers, PoC on steamlink.

    Poništi
  20. proslijedio/la je Tweet
    10. stu 2018.

    Exploiting Windows' IP ID Randomization to Leak Kernel Data and More (CVE-2018-8493)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·