Twitter | Pretraživanje | |
Arun Manoharan
Security Enthusiast | Exploit Development | Pentesting | Python | CTF | Gamer
2.137
Tweetovi
623
Pratim
141
Osobe koje vas prate
Tweetovi
Arun Manoharan proslijedio/la je tweet
Andrea Fioraldi 30. sij
Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Leandro Barragan 28. sij
[Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Texplained 28. sij
Interested about our Reverse Engineering technologies ? Here are our next training sessions: 📆10 - 12 February (in our lab) 📆20 - 21 April (HiTB, Amsterdam, The Netherlands)
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Dominik 14. sij
If anyone wants to use unicorn afl with good ol' C, here's how to do it
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Philippe Harewood 24. sij
Cross-Site Websocket Hijacking bug in Facebook that leads to account takeover By Bounty: $12500
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Caleb Fenton 25. sij
I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Prateekg147 27. sij
Great talk from AMS 2019 on new attack vectors on *OS, deserves more than just 100 views
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Binni Shah 22. sij
Learn to write your first OS kernel (minimalist kernel) : Kernels 101 – Let’s write a Kernel : cc
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Binni Shah 22. sij
Hello world from a bootloader - writing a simple bootloader in 16-bit assembly that uses BIOS interrupts to print text to the screen : cc
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Binni Shah 22. sij
Custom Malware Development (Establishing A Shell Through the Target’s Browser) : cc
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Binni Shah 24. sij
TLDR pages : Simplified, community-driven man pages w/ examples : -->to quickly get access to community-driven cheat sheets. It has more than 60 programming languages and UNIX/Linux commands :
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Binni Shah 24. sij
Malware Samples : Free Malware Sample Sources for Researchers : Specialized Honeypots for SSH, Web and Malware Attacks : cc
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Binni Shah 24. sij
Hypervisor From Scratch – Part 7 : Using EPT & Page-Level Monitoring Features : 6: Virtualizing An Already Running System : 5: Setting up VMCS & Running Guest Code : cc
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Binni Shah 24. sij
hwsec_lecture_notes : Lecture notes for the Hardware and Embedded Systems Security lecture : cc
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Mobile Security 9. sij
Reverse engineering and modifying an Android game (.apk) [CTF-writeup]
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Ptrace Security GmbH 2. sij
Messenger Hacking - Remotely Compromising an iPhone over iMessage
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Lovecore 30. pro
I would like to thank , and for consuming all of my time on the Player2 machine this holiday break. Holy hell I learned quite a bit, thanks!
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan 31. pro
Congratulations :)
Reply Retweet Označi sa "sviđa mi se"
Arun Manoharan proslijedio/la je tweet
Naveenkumar S 26. pro
Ghostphisher just owned root on PlayerTwo ! via A great box which I had completed. Thanks & for creating this box.
Reply Retweet Označi sa "sviđa mi se"