You

@zeewox

Information Security

CYBER DIGITAL DEEP WEB
Vrijeme pridruživanja: rujan 2009.

Tweetovi

Blokirali ste korisnika/cu @zeewox

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @zeewox

  1. Prikvačeni tweet
    6. ožu 2018.
    Poništi
  2. proslijedio/la je Tweet
    prije 23 sata
    Poništi
  3. 3. velj

    pro tip : you can force pointer size when you choose a custom data type i.e. "my_struct_t *32" in a 64bit project. 🤘

    Poništi
  4. 26. sij

    Three protected witnesses accuse Spanish ex-marine of spying on Julian Assange -

    Poništi
  5. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  6. proslijedio/la je Tweet
    29. pro 2019.
    Odgovor korisnicima

    VIP hash table is effectively a list of signed rx firehose payloads. Usually when a fh loader is leaked/found it’s bundled with img seta & config xmls. If VIP enabled, the signed table bin file should be there too. So no big deal for repairing since anti-rollback is rarely used.

    Poništi
  7. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  8. proslijedio/la je Tweet

    🗣 Introducing a new public code search tool for Android Open Source Project (AOSP)! Now you can explore the AOSP codebase locally without having to download the source! Learn more ↓

    Poništi
  9. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  10. proslijedio/la je Tweet
    20. stu 2019.

    I saw a guy reporting a vulnerability today. No logo. No website. No drama. He just emailed a write-up. Providing all the details needed to reproduce and fix the issue. Like a psychopath.

    Prikaži ovu nit
    Poništi
  11. 19. stu 2019.

    And Shenmue 3 !

    Prikaži ovu nit
    Poništi
  12. 18. stu 2019.

    This week is quite exciting: , and truck

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    New: Infamous hacker Phineas Fisher offers $100,000 as a “Hacktivist Bug Hunting Program” for hacks against spyware companies like NSO, banks, or oil companies.

    Poništi
  14. proslijedio/la je Tweet

    Success! The duo got the Galaxy S10 to connect to their rogue base station and then pushed a file to the phone. Third year in a row. Off to the disclosure room to get all the details.

    Poništi
  15. proslijedio/la je Tweet

    We’ve made the decision to stop all political advertising on Twitter globally. We believe political message reach should be earned, not bought. Why? A few reasons…🧵

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    27. ruj 2019.

    EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).

    Prikaži ovu nit
    Poništi
  17. 6. ruj 2019.
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    12. kol 2019.
    Poništi
  19. 10. srp 2019.

    Why implant developers aren't prosecuted as any malware developers?

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    14. lip 2019.

    Pushing my "work fail" on DWARF virtual processor support for IDA pro including sh33t emulator to run along. Have a nice w33kend!

    Poništi
  21. proslijedio/la je Tweet
    12. lip 2019.
    Odgovor korisnicima

    IP addresses coming mostly from China. Historically, all state actor-sized DDoS (200-400 Gb/s of junk) we experienced coincided in time with protests in Hong Kong (coordinated on ). This case was not an exception.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·