Twitter | Pretraživanje | |
Tweetovi
0x00pico proslijedio/la je tweet
Chris Williams 24 h
This is pretty sweet. You can make your own USB security key using an off-the-shelf Arm-based dongle and Google's OpenSK firmware running on TockOS, all virtually written in OpenSK: TockOS:
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
b0bb 1. velj
Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Nicolas Krassas 4. velj
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Ruben Santamarta 4. velj
Root cause analysis and exploit for a Windows kernel ws2ifsl.sys use-after-free vulnerability.
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Nicolas Krassas 3. velj
TeamViewer stored user passwords encrypted, not hashed, and the key is now public
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Internet of Shit 3. velj
99 smart phones in a pull-cart = instant traffic jam
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Evilcry_ 2. velj
Virtual Method Table for newbies #1 Virtual Method Table for newbies #2
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
FireF0X 2. velj
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Evilcry_ 2. velj
Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Nicolas Krassas 2. velj
GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Nicolas Krassas 14. sij
Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline Devices
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Binni Shah 14. sij
Reverse engineering course (Focuses on x64 Windows) : cc
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Binni Shah 14. sij
Awesome Forensics Resources : Almost 300 open source forensics tools and 600 blog posts about forensics &1000+ Github Repos about Security Resource Collection :
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Azeria 3. sij
Reverse Engineering Encrypted Code Segments: by Ryan Cornateanu
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Azeria 30. pro
Apple: we’re the most secure OS! No bugs, don’t look. Corellium: *provides researches with a proper research environment to find bugs and test their apps* Researchers: *find and report bugs using Corellium* Apple: no no no no nooo NO 😱 *sues Corellium*
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Nicolas Krassas 30. pro
Open source RAT collection, and malicious RAT analysis reports.
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
R136a1 14. pro
Archive of is now available | All attachments are public | Note that attachments have PHP file extension but are actually archives | Rename according to its file type (ZIP, RAR, ...) and open it | Thanks for everybody who contributed over those ~10 years!
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
ElfMaster 11. pro
Understand attack surface of statically linked binaries in Linux and learn how to harden them
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Somdev Sangwan 11. pro
DLL Hijacking for Dummies [1/2] > Download and run this process monitor () > Download and run target's desktop app > Look for processes with result "name not found" > Note down the paths of these processes
Reply Retweet Označi sa "sviđa mi se"
0x00pico proslijedio/la je tweet
Clément Labro 11. pro
New blog post: "CDPSvc DLL Hijacking - From LOCAL SERVICE to SYSTEM" where I mostly talk about Tokens and Impersonation. 🔥 👉
Reply Retweet Označi sa "sviđa mi se"