MX lab

@thr33z3r0

***中国网安***广州三零卫士 ***木星安全实验室*非官方安全推送 30wish Unofficial Security Tech Push😀🤓😎bravo team

国际空间站
Vrijeme pridruživanja: srpanj 2018.

Tweetovi

Blokirali ste korisnika/cu @thr33z3r0

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @thr33z3r0

  1. 24. sij

    祝大家2020年新春愉快!!

    Poništi
  2. proslijedio/la je Tweet
    18. sij

    Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL" 🥳 Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)😎

    Poništi
  3. proslijedio/la je Tweet
    15. sij

    Don't just teach your students to read. • Teach them to question what they read, what they study. • Teach them to doubt. • Teach them to think. • Teach them to make mistakes and learn from them. • Teach them how to understand something.

    Poništi
  4. proslijedio/la je Tweet
    16. sij

    Backdooring a smart camera by creating a malicious firmware upgrade :

    Poništi
  5. proslijedio/la je Tweet
    16. sij

    CVE-2020-0601: the ChainOfFools attack explained with PoC and a test website.

    Poništi
  6. proslijedio/la je Tweet
    7. sij

    PCILeech FPGA custom PCIe configspace now supported! Mimic real devices more closely for research purposes 😈 Also, code signing of binaries.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    9. sij
    Poništi
  8. proslijedio/la je Tweet
    27. pro 2019.

    Our presentation on VMware Virtual Machine Escape () is in process. Please watch it in room BORG or on

    Poništi
  9. proslijedio/la je Tweet
    29. pro 2019.

    Other scans TCP 4567,5555,8080,88,80,8000, downloader: nc://185.61[.137.172:51235 http://185[.61.137.172/oem/wget.sh http://185[.61.137.172/wget.sh

    Poništi
  10. proslijedio/la je Tweet
    27. pro 2019.

    Finally got around to migrating my AES Powershell payload created for to a standalone script. Just needs position independent shellcode (Windows). Should probably also obfuscate your shellcode prior.

    Poništi
  11. proslijedio/la je Tweet
    27. pro 2019.

    I blog about writing custom protobuf mutation routines for fuzzing: Happy holidays and happy fuzzing! May you beat randomness with a custom mutation and find that elusive bug :-)

    Poništi
  12. proslijedio/la je Tweet
    1. pro 2019.

    📺 New Tutorial Video 📺 Intro to scripting with Python and 🐍 Learn how to automate resolving the dynamic API calls ⚙️

    Poništi
  13. proslijedio/la je Tweet
    11. pro 2019.

    uEmu update is here! • long-awaited extension system • StackView and Lazy mapping (cc ) • Python3 support • various fixes

    Poništi
  14. proslijedio/la je Tweet
    10. pro 2019.

    Finding iOS Kernel Exploit // SockPuppet Jailbreak - CVE-2019-8605 by and

    Poništi
  15. proslijedio/la je Tweet
    Poništi
  16. proslijedio/la je Tweet
    22. stu 2019.

    Just published my scripts to reconstruct Microsoft COM-Code. Tested on v7.4 and Python v2+3 => Happy reversing!

    Poništi
  17. proslijedio/la je Tweet
    27. stu 2019.
    Poništi
  18. proslijedio/la je Tweet
    26. stu 2019.

    [Blog] Viper RGB Driver Local Privilege Escalation (CVE-2019-18845)

    Poništi
  19. proslijedio/la je Tweet
    27. stu 2019.

    kBdysch kBdysch is a collection of fast Linux kernel specific fuzzing harnesses supposed to be run in userspace in a guided fuzzing manner.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·