Twitter | Pretraživanje | |
Tris
Low level programming and exploitation
187
Tweetovi
169
Pratim
61
Osobe koje vas prate
Tweetovi
Tris 22 h
Odgovor korisniku/ci @jamiebishop123 @xtian_kisutsa
Have you tried nodejs os module? os.arch()
Reply Retweet Označi sa "sviđa mi se"
Tris 1. velj
Odgovor korisniku/ci @JohnTroony
I need to catch up with pwnables. They seem to be precise. Noob everyday.
Reply Retweet Označi sa "sviđa mi se"
Tris 1. velj
Odgovor korisniku/ci @JohnTroony
This is awesome. I can see you are playing pwnable{•}xyz from recognizing path in the cutter.
Reply Retweet Označi sa "sviđa mi se"
Tris 22. sij
Odgovor korisniku/ci @jadethuo
I did that HTB last year. I hate people who reset the machines on the free tier servers. I will go back soon.
Reply Retweet Označi sa "sviđa mi se"
Tris proslijedio/la je tweet
Riatre 15. sij
Late to the party but yeah, confirmed this bug can indeed be used to fake signature of any ECDSA intermediate CA. Left side is an unpatched VM. Didn't bother filling all those strange x509 extension fields required by modern browsers so no fancy in browser screenshot.
Reply Retweet Označi sa "sviđa mi se"
Tris 8. sij
Odgovor korisniku/ci @brianmutinda_
My first suspension was in form 1 third term. came back to school with 2 post and barbed wire. 2 suspension form 4 1st term.
Reply Retweet Označi sa "sviđa mi se"
Tris 31. pro
Odgovor korisniku/ci @xtian_kisutsa
Thanks a lot man.
Reply Retweet Označi sa "sviđa mi se"
Tris 31. pro
Odgovor korisniku/ci @xtian_kisutsa
3/3 thanks a lot for challenges you gave me. Arm assembly gave me a new perspective and encouraged me to dive into binary exploitation.
Reply Retweet Označi sa "sviđa mi se"
Tris 31. pro
Odgovor korisniku/ci @AfricaHackon
2/3 I was able to attend my second . Learned a lot and made new friends.Thanks all people involved in making it a success.
Reply Retweet Označi sa "sviđa mi se"
Tris 31. pro
Odgovor korisniku/ci @0xtris
1/3 balancing my undergraduate and infosec degree has been tough and rewarding. But now I can focus all my energy in infosec after 2020 January. I will now have enough time to do educational stuff.
Reply Retweet Označi sa "sviđa mi se"
Tris 31. pro
2019 has been both a tough year and rewarding year too. I was able to make some strives in my infosec journey. Thanks all people who have been there for advice, encouragement and motivation.
Reply Retweet Označi sa "sviđa mi se"
Tris proslijedio/la je tweet
Michael Sikorski 12. pro
Check out this tech talk I gave to on Reverse Engineering Ransomware. This makes a great introduction to malware analysis.
Reply Retweet Označi sa "sviđa mi se"
Tris proslijedio/la je tweet
Patricia Aas 8. pro
Odgovor korisniku/ci @Kensan42 @cynicalsecurity
For books I have high hopes for “Modern C” which should be out shortly:
Reply Retweet Označi sa "sviđa mi se"
Tris proslijedio/la je tweet
ElfMaster 7. pro
Looking to hire a strong C dev and Reverse engineer with knowledge of Linux internals and a deep understanding of ELF voodoo & Leadership skills. Message me for more details. if you know a possible fit please let me know.
Reply Retweet Označi sa "sviđa mi se"
Tris 7. pro
Odgovor korisniku/ci @th3_gr00t
Pattern matching . One hell, but cuts a lot of work on project you are working on.
Reply Retweet Označi sa "sviđa mi se"
Tris 7. pro
Odgovor korisniku/ci @truneski
They are so few. Most are based on "roles" Which can be performed remotely
Reply Retweet Označi sa "sviđa mi se"
Tris proslijedio/la je tweet
Grant Sanderson 6. pro
Remember that video about how block collisions can compute the digits of pi? A friend, Adam Brown, just showed that the math underlying this is actually identical to the math behind a very famous quantum search algorithm (Grover's): Genuinely crazy!
Reply Retweet Označi sa "sviđa mi se"
Tris proslijedio/la je tweet
Tao Yan 2. pro
The slides of our talk "Pool Fengshui in Windows Vulnerability Exploitation" at are available. Three ways for Pool Feng Shui with RDP PDU, two new methods to exploit CVE-2019-0708 .
Reply Retweet Označi sa "sviđa mi se"
Tris 27. stu
Need help to understand this output by mtrace?
Reply Retweet Označi sa "sviđa mi se"
Tris 27. stu
Complex analysis {contour integration} making me scratch my head.
Reply Retweet Označi sa "sviđa mi se"