Twitter | Pretraživanje | |
Samuel Groß
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:
Reply Retweet Označi sa "sviđa mi se" More
Samuel Groß 9. sij
Odgovor korisniku/ci @5aelo
The README and various code comments hopefully also help explain how the PoC exploit works: and also
Reply Retweet Označi sa "sviđa mi se"
Sam Hanson 11. sij
Odgovor korisniku/ci @5aelo
Looks awesome! Your research into JavaScript engine exploits played a large part in my groups research for my grad-level computer security class. We got an A. Thanks for your hard work!
Reply Retweet Označi sa "sviđa mi se"
Samuel Groß 12. sij
Odgovor korisniku/ci @secureloon
Great to hear, thanks! :)
Reply Retweet Označi sa "sviđa mi se"
Freedom iDevice #Checkra1nLinux! 9. sij
Odgovor korisniku/ci @5aelo @iM4CH3T3
What is this
Reply Retweet Označi sa "sviđa mi se"
#WeAlliPhoneFamily 10. sij
Odgovor korisniku/ci @iS4ndb0x @5aelo
Blogpost about multiple iMessage bugs combined In an attack. Fixed in iOS 12.4.1
Reply Retweet Označi sa "sviđa mi se"
Cedric Halbronn 9. sij
Odgovor korisniku/ci @5aelo
Nice. Is that what you will be presenting at offensivecon too?
Reply Retweet Označi sa "sviđa mi se"
Dan Henderson 10. sij
Odgovor korisniku/ci @5aelo
Excellent (and terrifying) post!
Reply Retweet Označi sa "sviđa mi se"
Jovonni 10. sij
Odgovor korisniku/ci @5aelo @klmitchell212
Reply Retweet Označi sa "sviđa mi se"
James Willy 10. sij
Odgovor korisniku/ci @5aelo
always you! very creative...
Reply Retweet Označi sa "sviđa mi se"
Jonathan Fritz 10. sij
Odgovor korisniku/ci @5aelo
Thank you! I enjoyed your talk at
Reply Retweet Označi sa "sviđa mi se"