|
Tris
@
0xtris
|
|
Low level programming and exploitation
|
|
|
187
Tweetovi
|
169
Pratim
|
61
Osobe koje vas prate
|
| Tweetovi |
|
Tris
@0xtris
|
22 h |
|
Have you tried nodejs os module? os.arch()
|
||
|
|
||
|
Tris
@0xtris
|
1. velj |
|
I need to catch up with pwnables. They seem to be precise. Noob everyday.
|
||
|
|
||
|
Tris
@0xtris
|
1. velj |
|
This is awesome. I can see you are playing pwnable{•}xyz from recognizing path in the cutter.
|
||
|
|
||
|
Tris
@0xtris
|
22. sij |
|
I did that HTB last year. I hate people who reset the machines on the free tier servers. I will go back soon.
|
||
|
|
||
| Tris proslijedio/la je tweet | ||
|
Riatre
@_riatre
|
15. sij |
|
Late to the party but yeah, confirmed this bug can indeed be used to fake signature of any ECDSA intermediate CA. Left side is an unpatched VM. Didn't bother filling all those strange x509 extension fields required by modern browsers so no fancy in browser screenshot. pic.twitter.com/Q9oFeajaWz
|
||
|
|
||
|
Tris
@0xtris
|
8. sij |
|
My first suspension was in form 1 third term. came back to school with 2 post and barbed wire. 2 suspension form 4 1st term.
|
||
|
|
||
|
Tris
@0xtris
|
31. pro |
|
Thanks a lot man.
|
||
|
|
||
|
Tris
@0xtris
|
31. pro |
|
3/3 @xtian_kisutsa thanks a lot for challenges you gave me. Arm assembly gave me a new perspective and encouraged me to dive into binary exploitation.
|
||
|
|
||
|
Tris
@0xtris
|
31. pro |
|
2/3 I was able to attend my second @AfricaHackon . Learned a lot and made new friends.Thanks all people involved in making it a success.
|
||
|
|
||
|
Tris
@0xtris
|
31. pro |
|
1/3 balancing my undergraduate and infosec degree has been tough and rewarding. But now I can focus all my energy in infosec after 2020 January.
I will now have enough time to do educational stuff.
|
||
|
|
||
|
Tris
@0xtris
|
31. pro |
|
2019 has been both a tough year and rewarding year too. I was able to make some strives in my infosec journey. Thanks all people who have been there for advice, encouragement and motivation.
|
||
|
|
||
| Tris proslijedio/la je tweet | ||
|
Michael Sikorski
@mikesiko
|
12. pro |
|
Check out this tech talk I gave to @JaneStreetGroup on Reverse Engineering Ransomware. This makes a great introduction to malware analysis. youtube.com/watch?v=gjCKKL…
|
||
|
|
||
| Tris proslijedio/la je tweet | ||
|
Patricia Aas
@pati_gallardo
|
8. pro |
|
For books I have high hopes for “Modern C” which should be out shortly:
amazon.com/Modern-C-Jens-…
|
||
|
|
||
| Tris proslijedio/la je tweet | ||
|
ElfMaster
@ryan_elfmaster
|
7. pro |
|
Looking to hire a strong C dev and Reverse engineer with knowledge of Linux internals and a deep understanding of ELF voodoo & Leadership skills. Message me for more details. @ulexec @silviocesare @emdel if you know a possible fit please let me know.
|
||
|
|
||
|
Tris
@0xtris
|
7. pro |
|
Pattern matching . One hell, but cuts a lot of work on project you are working on.
|
||
|
|
||
|
Tris
@0xtris
|
7. pro |
|
They are so few. Most are based on "roles" Which can be performed remotely
|
||
|
|
||
| Tris proslijedio/la je tweet | ||
|
Grant Sanderson
@3blue1brown
|
6. pro |
|
Remember that video about how block collisions can compute the digits of pi? A friend, Adam Brown, just showed that the math underlying this is actually identical to the math behind a very famous quantum search algorithm (Grover's): arxiv.org/abs/1912.02207
Genuinely crazy! pic.twitter.com/mZKx7gnLQv
|
||
|
|
||
| Tris proslijedio/la je tweet | ||
|
Tao Yan
@ga1ois
|
2. pro |
|
The slides of our talk "Pool Fengshui in Windows #RDP Vulnerability Exploitation" at #bluehatseattle are available. github.com/ga1ois/BlueHat… Three ways for Pool Feng Shui with RDP PDU, two new methods to exploit CVE-2019-0708 #bluekeep. pic.twitter.com/4ny08Ba4TL
|
||
|
|
||
|
Tris
@0xtris
|
27. stu |
|
Need help to understand this output by mtrace? #infosec pic.twitter.com/lIQvgwNjnW
|
||
|
|
||
|
Tris
@0xtris
|
27. stu |
|
Complex analysis {contour integration} making me scratch my head.
|
||
|
|
||