Danila Parnishchev

@zero_wf

Application security specialist

Vrijeme pridruživanja: svibanj 2012.

Tweetovi

Blokirali ste korisnika/cu @zero_wf

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @zero_wf

  1. proslijedio/la je Tweet
    31. sij

    Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):

    Poništi
  2. proslijedio/la je Tweet
    24. sij
    Poništi
  3. proslijedio/la je Tweet
    17. sij
    Poništi
  4. proslijedio/la je Tweet
    17. sij
    Poništi
  5. proslijedio/la je Tweet
    16. sij

    Let me save you some clicks. Direct links to the POCs are here: KudelskiSec POC - Ollypwn POC -

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    8. sij

    As promised, I've documented some additional information from research into . There is a bit of misleading information out there so I hope this will clear the air a bit. cc:

    Poništi
  7. proslijedio/la je Tweet
    7. sij

    We’re excited to announce the initial release of ATT&CK for ICS! You can find the ICS knowledge base at and a blog post by explaining what’s new and different here: . Thank you to everyone who helped us get here!

    Poništi
  8. proslijedio/la je Tweet
    5. sij

    SSH Pentesting Guide - A Comprehensive Guide to Breaking SSH :

    Poništi
  9. 3. sij
    Poništi
  10. 2. sij

    Siemens security advisory on SPPA T3000 system issues found by

    Poništi
  11. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    27. pro 2019.

    Friday night tweetin' for those that want their Ida and their Ghidra too. Chock full o' bugs no doubt.

    Poništi
  13. 28. pro 2019.

    Great talk from on power generation turbines software security! The whitepaper is about to be released) Check after release. And don't forget to check our s7scan tool and share your feedback, always welcome)

    Poništi
  14. proslijedio/la je Tweet
    21. pro 2019.

    New writeup, one of my favorite bugs 🤠 - Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty Featuring...

    Poništi
  15. proslijedio/la je Tweet
    3. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    4. pro 2019.

    Today presented our work on Siemens S7-1200v4 bootloader reversing at . We will present more about Siemens ADONIS RTOS later this year at and will present the most complete package including releasing the code for using the special access feature at .

    Poništi
  17. proslijedio/la je Tweet
    25. stu 2019.

    What? A library that wraps IDA decompiler API and makes it usable? *and* documented? We just released a thing. Blog: Github: Docs!!!:

    Poništi
  18. proslijedio/la je Tweet
    14. stu 2019.

    Stories and lessons from Incident Response practice by Pavel Kargapoltsev on 2019. Thanks for all the questions from audience and organisers for great event! Get the slides ATT&CK inside!

    Poništi
  19. proslijedio/la je Tweet
    21. lis 2019.
    Poništi
  20. proslijedio/la je Tweet
    15. lis 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·