|
Ömer Coşkun
@
0xM3R
Darknet
|
|
Gentleman, Computer Scientist (RE, EXP, PRO) - I don't talk my employer behalf - chasing #blackhats #0days #cybercrime
|
|
|
2.176
Tweetovi
|
399
Pratim
|
1.501
Osobe koje vas prate
|
| Tweetovi |
| Ömer Coşkun proslijedio/la je tweet | ||
|
Onur Mutlu
@_onurmutlu_
|
2. velj |
|
The full set of my 2019 graduate-level computer architecture course lectures at ETH Zurich is online, along with all lecture videos, slides, and course materials:
Course schedule: lnkd.in/egEFGer
Youtube playlist: lnkd.in/eaR7J_T
First…lnkd.in/ewnHEBC
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
0xdf
@0xdf_
|
1. velj |
|
RE just retired from @hackthebox_eu. As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.
0xdf.gitlab.io/2020/02/01/htb…
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Ronald Huizer
@ronaldhuizer
|
7. pro |
|
The scathing absence of Python 3 support in libptrace has been resolved as of now with the release of 1.0-rc2
Time to rest. I'm convinced that dealing with NSIS scripting past midnight would mortify even the hardiest of Flagellants.
github.com/immunityinc/li…
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
dengkeng
@dengken9
|
20. sij |
|
TEE-reversing
github.com/enovella/TEE-r…
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Tim Strazzere
@timstrazz
|
20. sij |
|
Open sourced a bit of automation around unpacking #Android apps using @CorelliumHQ devices;
github.com/corellium/core…
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Ghidra Ninja
@ghidraninja
|
17. sij |
|
I just published a video explaining the details of CVE-2020-0601 aka Curveball: The Microsoft CryptoAPI vulnerability that was reported by the NSA.
youtube.com/watch?v=8RI60a…
|
||
|
|
||
|
Ömer Coşkun
@0xM3R
|
14. sij |
|
@CumhurFrankfurt @fatihtezcan "@hakansukur o süslediğin çam ağaçları,... (hikayenin gerisini biliyorsun kanka, fill in the blank 😂)"
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Andrey Konovalov
@andreyknvl
|
8. sij |
|
Linux Kernel Runtime Guard (LKRG) bypass collection by Ilya Matveychikov, CC @Adam_pi3
github.com/milabs/lkrg-by…
|
||
|
|
||
|
Ömer Coşkun
@0xM3R
|
8. sij |
|
EncroChat?
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Siguza
@s1guza
|
7. sij |
|
New blog post. ARM hardware bug. In the specification.
siguza.github.io/PAN/
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Hacker Fantastic
@hackerfantastic
|
3. sij |
|
APT34 partial tools leak (repost as this got taken down very quickly) mega.nz/#!tdMGnIwb!NyT…
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Fire30
@Fire30_
|
30. pro |
|
Also while I am on twitter :P
github.com/Fire30/bad_hoi…
PS4 Webkit exploit for 6.XX consoles. Gains addrof/fakeobj and arbitrary read and write primitives. Fixed in 7.00.
Uses bug from: bugs.chromium.org/p/project-zero…
|
||
|
|
||
|
Ömer Coşkun
@0xM3R
|
30. pro |
|
Blogpost with the details, or it didn't happen!
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Mobile Security
@mobilesecurity_
|
29. pro |
|
KTRW: The journey to build a debuggable iPhone
#MobileSecurity #iOSsecurity
#36c3 by @_bazad
media.ccc.de/v/36c3-10806-k…
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Chris Eagle
@sk3wl
|
28. pro |
|
Friday night tweetin' github.com/cseagle/blc for those that want their Ida and their Ghidra too. Chock full o' bugs no doubt.
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Christian Werling
@_cwerling
|
27. pro |
|
The AMD Secure Processor is a CPU in your CPU you do not control.
It’s a Trusted Execution Environment to protect VMs from host access or copyrighted work from distribution.
At #36c3 I will present our PSP hacking and how we regained control over it.
fahrplan.events.ccc.de/congress/2019/…
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Samuel Groß
@5aelo
|
27. pro |
|
Slides + recording of my #36c3 talk: saelo.github.io/presentations/… media.ccc.de/v/36c3-10497-m… had to omit many details, but blogpost coming soon!
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Samuel Groß
@5aelo
|
27. pro |
|
My talk on iMessage exploitation (fahrplan.events.ccc.de/congress/2019/…) starts in two hours. You can watch it in room Ada or on streaming.media.ccc.de/36c3 #36c3
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
Jiliac
@Jilyac
|
26. pro |
|
We made a website which shows a genealogy of fuzzers: fuzzing-survey.org
Basically, this is a fork from the one we have in the survey, but which we can keep up-to-date and where anyone can contribute at: github.com/SoftSec-KAIST/…
|
||
|
|
||
| Ömer Coşkun proslijedio/la je tweet | ||
|
jiayy
@chengjia4574
|
25. pro |
|
I just ported exploit of Jann Horn's vuln CVE-2019-13272 to aarch64: github.com/jiayy/android_…
|
||
|
|
||