Tweetovi

Blokirali ste korisnika/cu @w4kfu

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @w4kfu

  1. proslijedio/la je Tweet
    29. sij

    discovery of the day: you can apply structure offsets to a selection of code 🤯 select code range, press T, select your structure, be amazed

    Poništi
  2. proslijedio/la je Tweet
    27. sij

    Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption

    Poništi
  3. proslijedio/la je Tweet
    24. sij

    Ever get a pointer to the middle of a struct? Just add the __shifted keyword to the variable's type definition!

    Poništi
  4. proslijedio/la je Tweet
    23. sij
    Odgovor korisniku/ci
    Poništi
  5. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    14. sij
    Poništi
  7. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  8. proslijedio/la je Tweet
    7. sij

    Welcome to the team :) Yet another  veteran reverser to enforce our incident response and hunting activities 💪 New projects are coming!

    Poništi
  9. proslijedio/la je Tweet
    4. sij

    I've just released ccrawl (). Its a -based tool that allows to collect and query various properties of C/C++ data structures, and to translate them for example to ctypes (including on C++ class instances.)

    Poništi
  10. proslijedio/la je Tweet
    27. pro 2019.

    Friday night tweetin' for those that want their Ida and their Ghidra too. Chock full o' bugs no doubt.

    Poništi
  11. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    20. pro 2019.

    We just updated the executive callback repo with a research on the callback used by PatchGuard

    Poništi
  13. proslijedio/la je Tweet
    20. pro 2019.

    "Hey la Kibana, Inspection des gadgets !" 😋 Pwning Kibana 6.2 using prototype pollution and CVE-2018-17246 by

    Poništi
  14. proslijedio/la je Tweet
    15. pro 2019.

    So I translated to myself 's article on Exploitation and the internals of Windows 10 RS5 (Userspace), and Saar suggested I'll upload it for everyone, so why not :) I hope this helps as it helped me, thank you Saar!

    Poništi
  15. proslijedio/la je Tweet
    6. pro 2019.

    Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.

    Poništi
  16. proslijedio/la je Tweet
    22. stu 2019.

    Just published my scripts to reconstruct Microsoft COM-Code. Tested on v7.4 and Python v2+3 => Happy reversing!

    Poništi
  17. proslijedio/la je Tweet
    18. stu 2019.

    After an additional week of work, ExHook is finally live. ExHook is a standalone project utilizing ByePgLib allowing you to hook all kernel-to-user exits (SYSCALL or any interrupt) bypassing PatchGuard. Enjoy!

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    16. stu 2019.

    A look inside Raspberry Pi hardware decoders licenses by ! That’s on page 43 of !

    Poništi
  19. proslijedio/la je Tweet
    15. stu 2019.

    Paged Out! #2 Thanks to all the authors and the institute! Enjoy!

    Poništi
  20. proslijedio/la je Tweet
    14. stu 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·