y0ny0ns0n

@y0ny0ns0n

Just another hacker wannabe, member of , have memory corruption bug in brain

Vrijeme pridruživanja: lipanj 2019.

Tweetovi

Blokirali ste korisnika/cu @y0ny0ns0n

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @y0ny0ns0n

  1. prije 4 sata

    P.S> Thanks to for awesome documentation! It really helps a lot such a newbie like me

    Prikaži ovu nit
    Poništi
  2. prije 13 sati

    WCTF 2019 - LazyFragmentationHeap Korean writeup I tried to learn about windows heap internals with this challenge

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    5. velj

    checkra1n for Linux is now available at ! 🌧️📲 It’s been months of hard work in the making and we’re so glad to finally show it to you.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    5. velj

    A Haiku wrote an exploit today plan to sell it for millions a collision with p0

    Poništi
  5. proslijedio/la je Tweet
    3. velj

    yep, this is important to note. some early papers I read about PAC mentioned that it could be used instead of a stack canary, but that would be quite problematic

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    . has done some great work on Chrome and he explains this more recent V8 code change. It requires some changes to previous techniques, but Chome/V8 is still reliably exploitable.

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    In the past year, I was researching Azure Stack, which is an on-premise version of Azure Cloud. In the following blog posts, we present information on what is Azure Stack and its architecture and disclose a vulnerability in Azure App Service that allowed a sandbox escape.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    31. sij

    Yearly reminder that by is awesome sauce 👌

    Poništi
  9. 31. sij

    15th of March, 2020

    Poništi
  10. 27. sij
    Poništi
  11. proslijedio/la je Tweet
    26. sij
    Poništi
  12. proslijedio/la je Tweet
    24. sij

    modexp is one of my fav. researchers; while I often skim on details he is killing it with posts that combine an extensive and comprehensive research on interesting and often nuanced topics and a very well written narrative top quality right there

    Poništi
  13. proslijedio/la je Tweet
    24. sij

    Hypervisor From Scratch – Part 7 : Using EPT & Page-Level Monitoring Features : 6: Virtualizing An Already Running System : 5: Setting up VMCS & Running Guest Code : cc

    Poništi
  14. proslijedio/la je Tweet
    23. sij

    You can catch the rerun of last night’s lightning talks here. TL;DR: fancy grep with CodeQL, backdoor grep with MSFT, Windows RPC wrapping for fun and convenience, and a game of “who’s SAML key is it really tho?”

    Poništi
  15. 23. sij
    Poništi
  16. proslijedio/la je Tweet
    21. sij

    Tech Preview 2020 is live! Workstation TP 20H1 now brings compatibility with Hyper-V enabled hosts. In TP 20H1, Workstation can now run when Credential or Device guard, or WSL is enabled. Blog: Direct Link:

    Poništi
  17. proslijedio/la je Tweet
    14. srp 2019.

    Results for the quickJS 0day challenge are out! Enjoy fresh ascii art, 0day and exploit techniques with curl | less

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    20. sij

    Nice collection of chrome sandbox escape POCs/exploits and methodology, go check it out !

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    23. ožu 2018.

    Short update: just checked the (really old) embarrassing double free behavior of android jemalloc () on pixel xl running 8.1.0, and it's the same. Details here

    Poništi
  20. proslijedio/la je Tweet
    19. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·