Terrance

@turnerhackz1

Exploit developer , Security researcher. JSC and XNU and BSD kernel.

0x7FFFFFFFF
Vrijeme pridruživanja: studeni 2016.

Tweetovi

Blokirali ste korisnika/cu @turnerhackz1

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @turnerhackz1

  1. 2. velj

    Is fmount() suceptible to concurent calls ?

    Poništi
  2. 19. sij

    Wait gigacage is disabled in cocoabuilds? Is iOS using a cocoabuild ?

    Poništi
  3. 17. sij

    Bug isn’t mines but the exploit part is. Type confusion of JSCell in the jsc engine

    Prikaži ovu nit
    Poništi
  4. 17. sij

    Bug patched in iOS 13.1🤧

    Prikaži ovu nit
    Poništi
  5. 17. sij

    Hey guys I’m back from suspension with big news!

    Poništi
  6. 10. sij

    Ok finally found this little section of the dyldsharecache ... dumping subtracting each time by 4000 bytes 💀.

    Poništi
  7. 10. sij

    I got around the limitations .

    Poništi
  8. 10. sij

    Interesting idea I came up with subtract 4000x bytes from the Jsc base in increments til I get to the shared cache base for some reason after two times it sticks I wonder why 🧐

    Poništi
  9. 10. sij

    Dumping from anchor I know for s fact this ain’t the header 😭figuring this out is a complete pain in the ass since .lo() doesn’t want to work🤦🏽‍♂️

    Poništi
  10. 9. sij

    I hate how getting the .lo() of the anchor address keeps returning 0 was this 0xfff bit for armv7 shared cache or arm64?

    Poništi
  11. 9. sij

    If you would like to follow up on the project itself it is

    Poništi
  12. 9. sij

    Just to let you guys know I’m on the build this primitive into arb shellcode execution via rop for me personally it is the most difficult. I am the only one plus I never did any type of full exploitation before this project I’m surprised I made it this far its 90% done.

    Poništi
  13. 9. sij
    Poništi
  14. 9. sij

    Anyone that has experience in making a safari jailbreak... when parsing the dyld shared cache. I’m sure I just follow the example of totallynotspyware but when sliding the static segments do I use the cache slide or the aslr slide?

    Poništi
  15. proslijedio/la je Tweet
    7. sij
    Poništi
  16. proslijedio/la je Tweet
    7. sij

    so if anyone finds a nice +0x4000 null deref bug, hmu let's write a nice 0day jailbreak :-)

    Poništi
  17. 28. pro 2019.

    So the bug used in corona and for the iOS 11 untether isn’t patched 👀💀

    Poništi
  18. 28. pro 2019.

    36C3 - Tales of old: untethering iOS 11 via

    Poništi
  19. proslijedio/la je Tweet

    Giving away $15,000 for Christmas!!! RT to enter!! More details dropping when my video drops !! Get ready ! Be cash app ready !

    Poništi
  20. 20. pro 2019.

    Oops probably off by a 1000 bytes brb 😂

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·