Vincent R

@vrome_

InfoSec Student, CTFplayer Aka Light

Rennes, France 127.0.0.1
Vrijeme pridruživanja: veljača 2017.

Tweetovi

Blokirali ste korisnika/cu @vrome_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @vrome_

  1. proslijedio/la je Tweet
    27. sij

    pwndrop - The new fast & fun way to set up an HTTP/WebDAV server for your payloads is coming! python -m SimpleHTTPServer may soon be retiring. Stay tuned! Here is a quick sneak peek:

    Poništi
  2. proslijedio/la je Tweet
    23. ruj 2019.

    : un logiciel de collecte de données forensiques, créé et utilisé par l'ANSSI pour l’investigation et la réponse à incident à grande échelle : ℹ️ Découvrez ce nouvel outil et contribuez à son développement !

    Poništi
  3. proslijedio/la je Tweet
    21. kol 2019.

    Aperi'Solve is now open source and got new features! - Images are now computed with numpy (faster) - Browse images with the arrow keys - Download files extracted with zsteg - Steghide implementation - … Have a try! Site: Sources:

    Poništi
  4. 17. srp 2019.
    Poništi
  5. 3. srp 2019.

    Appel à la communauté ! Recherche de personnes ayant déjà utilisé afin d'échanger :)

    Poništi
  6. proslijedio/la je Tweet
    28. ožu 2019.

    BLOG | Commando VM: The First of Its Kind Windows Offensive Distribution Born from our FLARE VM tool, Commando VM comes w/ automated scripts to help you build your own pen testing environment and ease the process of VM provisioning & deployment. >> Read:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    28. ožu 2019.

    Part 2 of my Heap Exploitation series is finished! ✨ Part 2: Understanding the Glibc Heap: Free, Bins, Tcache: In case you missed Part 1: Understanding the Glibc Heap - Overview and Allocation Strategies:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    6. sij 2019.

    Published my exploits for the Winworld challenge I presented at ! Pwn hard guys :)

    Poništi
  9. proslijedio/la je Tweet
    27. pro 2018.

    Everybody is at , and I'm here, developing pyvmidbg. I have my own Linux kernel debugger by now. I'm breaking on printk and checking that by reloading the btrfs module :) Next step is helping loading the symbols at the right offset when KASLR is enabled 🙂

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    26. pro 2018.
    Poništi
  11. 6. pro 2018.

    is almost finished, 😥! last talk about sandboxing micoservices cc @RomainKraft Next step DEFCON ?

    Poništi
  12. proslijedio/la je Tweet
    5. pro 2018.

    - Blue and red team goodies to attack AD joined UNIX boxes cc: ,

    Prikaži ovu nit
    Poništi
  13. 5. pro 2018.

    Let's Go ! 2 days in London with cc @ @RomainKraft

    Poništi
  14. 15. stu 2018.

    Videos of Mitre ATT&CK online !! Nice talk here about Blue vs Red Team --> Purple team ;) cc and

    Poništi
  15. 23. lis 2018.
    Poništi
  16. proslijedio/la je Tweet
    22. lis 2018.

    Just received 15 USB Rubber Ducky and 1 Bash Bunny from 🙂... still looking for the stickers 🤔😪 cc

    Poništi
  17. 9. lis 2018.

    CBEST is a framework to deliver controlled, bespoke, intelligence-led cyber security tests

    Poništi
  18. 25. ruj 2018.

    Turla Driver Loader- TDL is an open source implementation of the Turla/Uroburos driver loading technique

    Poništi
  19. 11. ruj 2018.

    Memory Deduplication: The Curse that Keeps on Giving - Breaking ASLR - Cross VM Leak - Side Channel ....

    Poništi
  20. 10. ruj 2018.

    A virustotal opensource ?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·