wjllz

@wjllz1

Just a student... Not a reseacher.

Vrijeme pridruživanja: kolovoz 2018.

Tweetovi

Blokirali ste korisnika/cu @wjllz1

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @wjllz1

  1. 27. sij
    Poništi
  2. 27. sij

    strange behavior....

    Poništi
  3. proslijedio/la je Tweet
    19. sij

    Popped calc in Chrome. This isn’t a 0day. I added a relative (oob) rw bug and an info leak to the latest version. I also disabled the sandbox to demonstrate arbitrary code execution. It’s a good playground for developing exploitation techniques.

    Poništi
  4. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    15. sij
    Poništi
  6. 14. sij

    I think if we want to write the exploit code for 17026. Google project zero’s reports is good enough😇.

    Poništi
  7. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    12. sij

    From Hyper-V admin to full system compromise.. coming soon ;-) cc

    Poništi
  9. proslijedio/la je Tweet

    UAF bugs exist all over and understanding how they occur is crucial. dives into a UAF in and provides details on the root cause and patch to fix it.

    Poništi
  10. 10. sij
    Poništi
  11. proslijedio/la je Tweet
    Poništi
  12. proslijedio/la je Tweet

    🎉 First security blogpost of 2020 🎉 Some people ask me, so here is how to start fuzzing APIs of JavaScript engines like Chrome/V8. In this blogpost, I'm using: ✅ Dharma/Domato ✅ Chrome/v8 ASan pre-built ✅ Honggfuzz ;)

    Poništi
  13. proslijedio/la je Tweet
    9. sij
    Poništi
  14. 7. sij

    很久没看win kernel了 第一次看到19h1的利用 特别mark一下 利用代码也在里面

    Prikaži ovu nit
    Poništi
  15. 7. sij
    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    7. sij

    For anyone interested in my presentation on Local RPC in .NET the HITB version is now up on YouTube.

    Poništi
  17. proslijedio/la je Tweet
    6. sij

    One of the scarier bugs I’ve found: with Microsoft’s go-ahead & after many hours spent, I’m excited to finally publish this writeup and PoC! 👩🏼‍💻

    Poništi
  18. 6. sij

    仔细想想 类似于天府杯的比赛项目 除了虚拟机 我好像都零零散散的接触过了 想玩一个nday就开始选方向好好挖下去

    Poništi
  19. 6. sij
    Poništi
  20. proslijedio/la je Tweet
    5. sij

    Leaking a Structure ID of JavaScriptCore with 0x19(JSFunctionType)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·