symeon

@symeonp

Security Analyst @ PenTestPartners

London, UK
Vrijeme pridruživanja: kolovoz 2009.

Tweetovi

Blokirali ste korisnika/cu @symeonp

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @symeonp

  1. proslijedio/la je Tweet
    31. sij

    CVE-2019-1406 : Microsoft Jet Engine ColumnLvText Type Confusion CVE-2019-1250 : Microsoft Jet database Record::IsNull Memory Corruption Found by &

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    I had the privilege of assisting on this research, great researcher and very interesting research! You should check it out if you're interested to know a bit of how a cloud provider works

    Poništi
  4. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    25. sij
    Poništi
  6. proslijedio/la je Tweet
    24. sij
    Odgovor korisniku/ci

    We intend to release

    Poništi
  7. 22. sij

    Hey I just saw your submission at BlueHat. Congrats, just a quick question, are you going to release any tools or is keep it as a private project? Thanks!

    Poništi
  8. proslijedio/la je Tweet
    19. sij
    Poništi
  9. proslijedio/la je Tweet
    10. sij
    Odgovor korisniku/ci
    Poništi
  10. proslijedio/la je Tweet
    7. sij

    The recording of my talk "Unveiling the Underground World of Anti-Cheats" at BlackHat Europe 2019 is now online! :D A pleasure to be part of !!  

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    8. sij

    Reversing XignCode3 Driver – Part 1 – Identifying the Driver Entry Point A mini-series of blog posts about XingCode 3. It should be a good way to jump into Windows Driver reversing if you haven't done it before :)

    Poništi
  12. proslijedio/la je Tweet
    26. pro 2019.

    Link to the repo: The gap between source and binary fuzzing is now smaller :)

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    20. pro 2019.

    Qt Gif parsing null deref rediscovered with

    Poništi
  14. proslijedio/la je Tweet
    20. pro 2019.

    My slides on "Unveiling the Underground Word of Anti-Cheats" are now available on the site. You can find additional information about bypasses to multiple Anticheats (new info at the end)

    Poništi
  15. proslijedio/la je Tweet
    19. pro 2019.

    Any interest for a new Windows kernel exploitation training on Windows 10 focusing on methodology and hands on exploitation? Analyzing one bug step-by-step from patch diffing up to exploitation, with a focus on generically targeting a previously unknown kernel component.

    Poništi
  16. proslijedio/la je Tweet
    18. pro 2019.

    Release 1.0! With the release of frida 2.8.0 all the Salker bugs that i reported are fixed and I'm going to release the first ufficial version of frida-fuzzer.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    15. pro 2019.

    So I translated to myself 's article on Exploitation and the internals of Windows 10 RS5 (Userspace), and Saar suggested I'll upload it for everyone, so why not :) I hope this helps as it helped me, thank you Saar!

    Poništi
  18. proslijedio/la je Tweet
    12. pro 2019.

    The video from my talk on structure-aware fuzzing at Black Hat was posted: I mostly cover libprotobuf-mutator but also discuss libFuzzer custom mutators.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    12. pro 2019.

    Seems that tonight's just about the right time to ask if anyone knows of a remote-friendly company looking for an SRE 🙃

    Poništi
  20. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·