| Tweetovi |
| cc proslijedio/la je tweet | ||
|
Evan Walls
@fuzzwalls
|
12. pro |
|
All @devttyS0's IDA scripts have (finally) been ported to Ghidra. Woohoo! github.com/fuzzywalls/ghi…
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
Arthur Wongtschowski
@artwongt
|
9. sij |
|
My team is once more hiring vulnerability researchers for our Redmond WA office. This is for low-level OS/platform security research work on Windows and Azure. More details on what we do at linkedin.com/pulse/vulnerab…. Apply directly at aka.ms/AA6z0a8 or DM me if interested!
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
Stefan Esser
@i0n1c
|
7. sij |
|
I wonder if this increases the value of patch diffing results. Because P0 will not disclose what the bugs are for a long time which automatically makes patch diffing more attractive 😂 twitter.com/i0n1c/status/1…
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
Orange Tsai 🍊
@orange_8361
|
9. sij |
|
Have reproduced Citrix SSL VPN pre-auth RCE successfully on both local and remote. Interesting bug!
tripwire.com/state-of-secur…
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
Samuel Groß
@5aelo
|
9. sij |
|
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage: googleprojectzero.blogspot.com/2020/01/remote…
|
||
|
|
||
|
cc
@cc0d4y
|
10. sij |
|
|
||
| cc proslijedio/la je tweet | ||
|
|
Axel Souchet
@0vercl0k
|
6. pro |
|
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs. github.com/0vercl0k/CVE-2… pic.twitter.com/LeAOCgqpMG
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
Nicolas Krassas
@Dinosn
|
4. pro |
|
Collection of public security audits grouped by programming language
github.com/pomerium/aweso…
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
mik
@mik235
|
29. stu |
|
Imagine a world where nobody made PoCs anymore. Every changelog would look like Cisco's: " Bug that causes crash"
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
Rachit Nigam
@notypes
|
19. stu |
|
I want to start this trend in academic papers: pic.twitter.com/Olx6fLMCq2
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
Justin Campbell
@metr0
|
17. stu |
|
Because Microsoft already has a mature static analysis capability, our bugs are predominantly from fuzzing. A minority are from manual code review. Anecdotally, the majority of bounty-eligible external cases in Windows are from fuzzing.
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
CodeColorist
@CodeColorist
|
17. stu |
|
KnownSec @80vul @seebug_team has just announced its bonus plan for zero day exploits. The highest is RMB 20M for a single exploit chain 🤔 pic.twitter.com/vn7LoTRkRR
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
axi0mX 🌧️📲
@axi0mX
|
24. lis |
|
"#checkm8: The iPhone Exploit That Hackers Use to Research Apple’s Most Sensitive Code"
This is what the title of this write-up would be if it was a VICE article. This is a detailed write-up of the vulnerability I found and how the exploit really works. habr.com/en/company/dse…
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
Monta Elkins
@montaelkins
|
12. lis |
|
I'm excited that my chipping attack made @WIRED
I'll go into more detail about the attack and defenses in two weeks at the @Cs3Sthlm ICS security conference in Stockholm Sweden (with live demo).
Hope to see you there!
wired.com/story/plant-sp…
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
j00ru//vx
@j00ru
|
10. lis |
|
The effort was inspired by Fortinet's CVE-2018-1040 from last year. Original write-up: fortinet.com/blog/threat-re…. Thanks!
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
|
Andreas Zeller
@AndreasZeller
|
10. lis |
|
What is it that makes modern fuzzers successful? (Hint: It might not be what you think, and this raises questions.)
andreas-zeller.blogspot.com/2019/10/when-r… pic.twitter.com/QfMrnwyfVe
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
SwiftOnSecurity
@SwiftOnSecurity
|
5. lis |
|
|
||
| cc proslijedio/la je tweet | ||
|
LambdaConcept
@LambdaConcept
|
27. ruj |
|
Debugging an iPhone with Bonobo JTAG cable + OpenOCD + GDB demoted by ch... youtu.be/3zpwSUXlz6A
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
Jeremiah Grossman
@jeremiahg
|
29. ožu |
|
Any list of “the most important researchers of the last 30 years” that doesn’t include Solar Designer is just plain wrong.
|
||
|
|
||
| cc proslijedio/la je tweet | ||
|
Steve Christey Coley
@SushiDude
|
17. ruj |
|
We, the CWE Team (@cwecapec), are pleased to announce the release of the 2019 CWE Top 25 Most Dangerous Software Errors, the first release since 2011. We look forward to the community's insights and suggestions! #CWETop25 #swsec #appsec cwe.mitre.org/top25/archive/…
|
||
|
|
||