Tweetovi

Blokirali ste korisnika/cu @wimpypolo

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @wimpypolo

  1. proslijedio/la je Tweet
    29. sij

    אם נעמה יששכר חוזרת לא צריך להסביר לה עכשיו שהיו בחירות ואז שוב בחירות ועכשיו שוב, פשוט נגיד שחיכינו לה עם זה

    Poništi
  2. proslijedio/la je Tweet
    24. sij

    Check out how my CTF team, Kernel Sanders and I approached CSAW's embedded security competition using angr and how we leveraged a buffer overflow to print arbitrary messages to the serial port using RFID shellcode

    Poništi
  3. proslijedio/la je Tweet
    23. sij
    Odgovor korisniku/ci

    This is perhaps my favourite quirk from HTML spec which is, in fact, mentioned directly in the spec:

    Poništi
  4. proslijedio/la je Tweet
    22. sij

    To add some context, Chrome's XSS Auditor was found to introduce exactly the same class of side-channel vulnerabilities. After several back and forths with the team that discovered the issue, we determined that it was inherent to the design and had to remove the code.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    21. sij

    Excited to speak at about logical vulnerabilities I discovered in Windows Error Reporting 😀

    Poništi
  6. proslijedio/la je Tweet
    18. sij

    New blog post: cuck00 A XNU/IOKit info leak 1day killed in iOS 13.3.1 beta 2.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    16. sij

    We need more hackers building businesses, but bootstrapping / running biz is hard to navigate. I’m starting a Slack for busticati founders and freelancers to get support from fellow pioneers. Chatham House Rule DM or slack@entrepreneers.com for an invite. RT for reach?

    Poništi
  8. proslijedio/la je Tweet
    11. sij

    I published a write-up for md15 from 36C3 CTF:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    11. sij
    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    9. sij

    Made a "quick" writeup on the and the in the kernel. I thought it might be useful to share. Suggestions are very welcome :)

    Poništi
  11. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    3. sij

    Our writeup for compilerbot challenge is up: Always fun solving challenges with

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  14. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  15. proslijedio/la je Tweet
    16. pro 2019.

    When you understand and can explain, why TX need to be connected to RX in Serial communications, you may add "hardware hacking" on your CV :)

    Poništi
  16. proslijedio/la je Tweet
    13. pro 2019.

    libFuzzer fuzzing SQLite in the browser using WebAssembly:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet

    Linux: privilege escalation via io_uring offload of sendmsg() onto kernel thread with kernel creds

    Poništi
  18. proslijedio/la je Tweet
    13. pro 2019.

    I wrote a thing about JSC exploitation (including how to leak StructureID) and Safari sandbox escape.

    Poništi
  19. proslijedio/la je Tweet
    12. pro 2019.

    Hey people I just wrote a short post on another kernel info leak I found and a bit about how I approached this research. Hopefully you will find it interesting. Feedback is welcome.

    Poništi
  20. proslijedio/la je Tweet
    6. pro 2019.

    A while back I did a quick fuzzing exercise on Google Chrome <portal> element

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·