Marco `wsx` Bartoli

@wsxarcher

More interests than time. Arch Linux user since 2009. Security Researcher. I will finish my bachelor one day. Atheist. HAM: IU1GJO

EU
Vrijeme pridruživanja: studeni 2010.

Tweetovi

Blokirali ste korisnika/cu @wsxarcher

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @wsxarcher

  1. proslijedio/la je Tweet
    prije 21 sat
    Odgovor korisniku/ci

    GDB is the reason printf-debugging was invented

    Poništi
  2. 4. velj
    Poništi
  3. 31. sij
    Tweet je nedostupan.
    Poništi
  4. 31. sij

    Sad day for EU

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    HWASAN (think of it as ASAN v2) has become available to developers on Android outside of Google. If you use C or C++ on Android, please give it a try. HWASAN is also available on Aarch64 Linux with a recent kernel.

    Poništi
  7. proslijedio/la je Tweet
    29. sij

    germans: security obsessed, fake facebook name, no twitter, no name in email address also germans: your CV should include a photo, how tall you are, where you were born, and your marital status

    Poništi
  8. proslijedio/la je Tweet
    28. sij

    New blog post on the need for a C-compatible bitfields crate for

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    28. sij

    The 360 Alpha team helped Apple to fix 0-click RCE & memory leak bugs in CoreBluetooth, which could allow attackers near by to remote control any Mac systems with zero interaction.

    Poništi
  10. proslijedio/la je Tweet
    27. sij

    Sometimes you love programming, and then sometimes you have days where being a potato farmer sounds really appealing 🥔

    Poništi
  11. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    22. sij

    If you found situations when using where big functions with the same name and with only 1 line of difference (or so) were assigned a ratio of 1.0, grab the latest version where I fixed it:

    Prikaži ovu nit
    Poništi
  13. 15. sij

    Just discovered "terrific" is positive o.O

    Poništi
  14. proslijedio/la je Tweet
    14. sij
    Odgovor korisniku/ci
    Poništi
  15. proslijedio/la je Tweet
    14. sij

    Who needs feature-test macros anyway

    Poništi
  16. proslijedio/la je Tweet
    9. sij

    1/7 Did you ever need to run a piece of C# code on Windows 3.11? Me neither, but I did it anyway. A thread.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    9. sij

    Announcing BLAKE3! 🥳 * Faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2 * Merkle tree: unlimited parallelism, verified streaming * Builtin MAC, KDF, XOF * One algorithm, no variants * Rust crate: Try it: cargo install b3sum

    Poništi
  18. proslijedio/la je Tweet
    9. sij

    Haybale version 0.2.0 is out! Now with support for: - LLVM 9 - LLVM extractvalue, insertvalue, invoke, resume, and landingpad instructions - C++ exceptions - Rust panics Plus, now analyze C++ and Rust code using demangled function names!

    Poništi
  19. proslijedio/la je Tweet
    31. pro 2019.

    anyone who continues to release software in Python2 past 00:00:00 01/01/2020 is fucking dead to me

    Poništi
  20. proslijedio/la je Tweet
    30. pro 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·