Twitter | Pretraživanje | |
Ömer Coşkun
Gentleman, Computer Scientist (RE, EXP, PRO) - I don't talk my employer behalf - chasing
2.176
Tweetovi
399
Pratim
1.501
Osobe koje vas prate
Tweetovi
Ömer Coşkun proslijedio/la je tweet
Onur Mutlu 2. velj
The full set of my 2019 graduate-level computer architecture course lectures at ETH Zurich is online, along with all lecture videos, slides, and course materials: Course schedule: Youtube playlist: First…
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
0xdf 1. velj
RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Ronald Huizer 7. pro
The scathing absence of Python 3 support in libptrace has been resolved as of now with the release of 1.0-rc2 Time to rest. I'm convinced that dealing with NSIS scripting past midnight would mortify even the hardiest of Flagellants.
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
dengkeng 20. sij
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Tim Strazzere 20. sij
Open sourced a bit of automation around unpacking apps using devices;
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Ghidra Ninja 17. sij
I just published a video explaining the details of CVE-2020-0601 aka Curveball: The Microsoft CryptoAPI vulnerability that was reported by the NSA.
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun 14. sij
" o süslediğin çam ağaçları,... (hikayenin gerisini biliyorsun kanka, fill in the blank 😂)"
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Andrey Konovalov 8. sij
Linux Kernel Runtime Guard (LKRG) bypass collection by Ilya Matveychikov, CC
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun 8. sij
Odgovor korisniku/ci @viperbjk
EncroChat?
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Siguza 7. sij
New blog post. ARM hardware bug. In the specification.
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Hacker Fantastic 3. sij
APT34 partial tools leak (repost as this got taken down very quickly)
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Fire30 30. pro
Also while I am on twitter :P PS4 Webkit exploit for 6.XX consoles. Gains addrof/fakeobj and arbitrary read and write primitives. Fixed in 7.00. Uses bug from:
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun 30. pro
Odgovor korisniku/ci @viperbjk
Blogpost with the details, or it didn't happen!
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Mobile Security 29. pro
KTRW: The journey to build a debuggable iPhone by
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Chris Eagle 28. pro
Friday night tweetin' for those that want their Ida and their Ghidra too. Chock full o' bugs no doubt.
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Christian Werling 27. pro
The AMD Secure Processor is a CPU in your CPU you do not control. It’s a Trusted Execution Environment to protect VMs from host access or copyrighted work from distribution. At I will present our PSP hacking and how we regained control over it.
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Samuel Groß 27. pro
Slides + recording of my talk: had to omit many details, but blogpost coming soon!
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Samuel Groß 27. pro
My talk on iMessage exploitation () starts in two hours. You can watch it in room Ada or on
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
Jiliac 26. pro
We made a website which shows a genealogy of fuzzers: Basically, this is a fork from the one we have in the survey, but which we can keep up-to-date and where anyone can contribute at:
Reply Retweet Označi sa "sviđa mi se"
Ömer Coşkun proslijedio/la je tweet
jiayy 25. pro
I just ported exploit of Jann Horn's vuln CVE-2019-13272 to aarch64:
Reply Retweet Označi sa "sviđa mi se"