Tweetovi

Blokirali ste korisnika/cu @steventseeley

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @steventseeley

  1. Prikvačeni tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Java jdbc (deserialization) vulnerability automated exploitation

    Poništi
  3. proslijedio/la je Tweet
    26. sij

    Windows / Linux Local Privilege Escalation Workshop (Materials included !) 🥳

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    The team is working through submissions for the first round of 2020 hiring for junior and senior roles. Be quick to get in there if you’re new to the industry or just looking for a change from the norm.

    Poništi
  5. proslijedio/la je Tweet
    31. sij
    Poništi
  6. 31. sij

    Awww super supps is now closed, how else am I gonna get my roids?

    Poništi
  7. 31. sij

    Why is this so hard to understand? It’s not a 0day, the bug was disclosed in 2018 ffs

    Poništi
  8. proslijedio/la je Tweet
    30. sij
    Odgovor korisniku/ci
    Poništi
  9. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  10. 30. sij

    In the lion king, Mufasa explains to Simba the circle of life: when we die, our bodies become the grass, and the antelope eat the grass. “When Scar murdered Mufasa, he threw him into a gorge. There’s no grass in the gorge, this, Mufasa never completed the circle of life.

    Poništi
  11. 29. sij
    Poništi
  12. 28. sij

    Pwn2Own AV edition :->

    Poništi
  13. 28. sij

    Alright Miami, we even now.

    Poništi
  14. proslijedio/la je Tweet
    25. sij

    Pwn2own 2020, what an amazing experience. Thanks to for putting this on! It is a literal dream come true to participate, let alone to win the competition. Dinner on Thursday with the best hackers around the world was surreal! Best of all becoming m8s with

    , , i još njih 3
    Poništi
  15. 24. sij

    Pwn2own was such an exciting event! Thanks goes out to all the teams and vendors for such an intense competition, and a big thanks to for hosting such a fun event! The best takeaway for me though personally was a new friend, :->

    Poništi
  16. proslijedio/la je Tweet

    Congrats to Inductive Automation for addressing the RCEs reported through Miami. The fixes are in the early access builds and is already referenced in their change logs. The fixes will also be available in 8.0.8.

    Poništi
  17. proslijedio/la je Tweet
    Poništi
  18. proslijedio/la je Tweet

    The final count is in, and with 92.5 points total, and are crowned Master of Pwn! Congratulations to everyone who participated. We'll have a full wrap video with all the results available tomorrow morning. We'll see you in Vancouver.

    Poništi
  19. proslijedio/la je Tweet

    Confirmed! , , and used a couple of bugs to get code execution on the Triangle Microworks SCADA Data Gateway. They earn $25,000 and 25 Master of Pwn points. That puts them in 2nd place with 87.5 total.

    Poništi
  20. proslijedio/la je Tweet

    Success! in their 3rd attempt of the day, and got code execution with continuation on the Iconics Genesis64. If confirmed, it would put them in the lead for Master of Pwn.

    Poništi
  21. 23. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·