Twitter | Pretraživanje | |
Bruno Botelho
Security Researcher
262
Tweetovi
572
Pratim
70
Osobe koje vas prate
Tweetovi
Bruno Botelho proslijedio/la je tweet
Exodus Intelligence 22 h
2019 was a great year for Exodus and 2020 is going to be even better. We're expecting to expand the team on a variety of fronts. If interested visit and email careers@exodusintel.com with a cv and references published work
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
Wonder of Science 2. velj
This is what Tesla Autopilot sees using neural networks that take 70,000 GPU hours to train and output 1,000 tensors (predictions) at each timestep. Source:
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
wrongbaud 31. sij
Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers Hope you enjoy! As always ping me with any questions
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
j00ru//vx 30. sij
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
Raz Mashat 28. sij
macOS security content is up! Assuming it will share the same CVE in the kernel and iOKit with iOS we got some pretty interesting bugs by and
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
Stephan van Schaik 27. sij
Finally, the disclosure is over! We present CacheOut, a new speculative execution attack to leak data on Intel CPUs via cache eviction despite current mitigations: , Andrew Kwong, Daniel Genkin and
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
Dino A. Dai Zovi 26. sij
Lowest latency response wins.
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
Andy 24. sij
Nintendo apparently forgot to enable compiler optimizations in Super Mario 64. Also, people of course decompiled it...
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
ollypwn 23. sij
PoC (Denial-of-Service) for CVE-2020-0609 & CVE-2020-0610 Please use for research and educational purpose only.
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
Boris Larin 21. sij
Hacking Sony PlayStation Blu-ray Drives [SLIDES]
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
Jorge Orchilles 18. sij
New Internet Explorer 0day and advisory out. Exploited in wild. No patch from Microsoft. Mitigation is to not use IE. CVE-2020-0674
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
shamrock hoax 18. sij
I got annoyed and created a VS2017 property sheet to help with building Intel Pintools outside of the MyPinTool directory:
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
Binni Shah 19. sij
Reverse Engineering the BMW Connected Apps Protocol :
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
Kryptos Logic 18. sij
RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
briankrebs 13. sij
Sources say Microsoft on Tuesday will fix an extraordinarily scary flaw in all Windows versions, in a core cryptographic component that could be abused to spoof the source of digitally signed software. Apparently DoD & a few others got an advance patch
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
Florian Hansemann 10. sij
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
Ben Hawkes 9. sij
Project Zero blog: "Remote‌ ‌iPhone‌ ‌Exploitation‌ ‌Part‌ ‌1:‌ ‌Poking‌ ‌Memory‌ ‌via‌ ‌iMessage‌ ‌and‌ ‌CVE-2019-8641‌" by Samuel Groß () --
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
Samuel Groß 9. sij
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
The Hacker News 9. sij
Attention! Hackers actively exploiting a new critical 0-day bug (CVE-2019-17026) in that could let remote attackers take complete control over your computers just by tricking you into visiting a malicious site. Read ➤ Update your browser now!
Reply Retweet Označi sa "sviđa mi se"
Bruno Botelho proslijedio/la je tweet
flyyy 28. pro
Our 36c3 presentation video : and slides: 😃 It's really a nice party. Hope to see you next year.
Reply Retweet Označi sa "sviđa mi se"