yrp

@yrp604

Vancouver, BC
Vrijeme pridruživanja: ožujak 2014.

Tweetovi

Blokirali ste korisnika/cu @yrp604

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @yrp604

  1. 1. lis 2019.

    5c2b5aebeb818fd614b471d698733e8db59e1b76 2019-bear-bracket.png

    Prikaži ovu nit
    Poništi
  2. 1. lis 2019.

    The second annual infosec fat bear bracket is here. Let’s gamble on some fat bears for charity. Brackets due ASAP.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    8. srp 2019.
    Poništi
  4. proslijedio/la je Tweet
    9. svi 2019.
    Poništi
  5. 16. ožu 2019.

    Like every year, if you’re coming to CSW and want some local spots feel free to drop me a line.

    Poništi
  6. proslijedio/la je Tweet
    4. velj 2019.
    Poništi
  7. proslijedio/la je Tweet
    21. sij 2019.
    Poništi
  8. 28. srp 2018.

    I’m a bit late but here’s another solution to ’s Arkos, just a bit different than the others: Thanks for putting it out, it was a fun challenge.

    Poništi
  9. 16. srp 2018.

    I wrote up an exploit for some of ’s old WebKit bugs. Would love any feedback.

    Poništi
  10. 14. ožu 2018.

    If anyone’s in town for CSW and wants to hang out, or just wants good local food/beer/coffee recs, feel free to hit me up.

    Poništi
  11. 12. pro 2017.

    The website for Attacking the Core (a fantastic book) link rotted. I threw the source files on github:

    Poništi
  12. proslijedio/la je Tweet
    7. pro 2017.

    This captivating GIF probably caught your attention, but why stop there? released Lighthouse v0.7 for IDA Pro this morning and there's a whirlwind of updates:

    Poništi
  13. 21. lis 2017.

    Also ’s Lighthouse is seriously fantastic.

    Prikaži ovu nit
    Poništi
  14. 21. lis 2017.

    I wrote a basic block tracer for Lighthouse. Suggestions for improvement would be appreciated:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    3. sij 2017.
    Poništi
  16. 16. lis 2016.

    Some fixes for compiling the IDA 6.95 SDK on macOS 10.12.

    Poništi
  17. 25. ožu 2016.

    Here’s the xnu/amd64 syscall path. Few interesting things: must use syscall instr, four types of valid syscalls.

    Poništi
  18. 14. velj 2016.

    I wrote a ptrace based assembly repl for x86, armv7, amd64. Useful for quickly playing with unknown instructions.

    Poništi
  19. 4. sij 2016.
    Odgovor korisniku/ci

    look for PTRACE_GETEVENTMSG. Neat as an example of code that silently breaks going from x86 to amd64. Probably not exploitable.

    Poništi
  20. 4. sij 2016.

    Fun little bug: ptrace(2) always writes sizeof(void *) to the 4th arg. When used with ints on amd64, results in null write4.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·