Twitter | Pretraživanje | |
cc
soat
118
Tweetovi
140
Pratim
27
Osobe koje vas prate
Tweetovi
cc proslijedio/la je tweet
Evan Walls 12. pro
All 's IDA scripts have (finally) been ported to Ghidra. Woohoo!
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
Arthur Wongtschowski 9. sij
My team is once more hiring vulnerability researchers for our Redmond WA office. This is for low-level OS/platform security research work on Windows and Azure. More details on what we do at . Apply directly at or DM me if interested!
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
Stefan Esser 7. sij
I wonder if this increases the value of patch diffing results. Because P0 will not disclose what the bugs are for a long time which automatically makes patch diffing more attractive 😂
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
Orange Tsai  🍊 9. sij
Have reproduced Citrix SSL VPN pre-auth RCE successfully on both local and remote. Interesting bug!
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
Samuel Groß 9. sij
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:
Reply Retweet Označi sa "sviđa mi se"
cc 10. sij
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
Axel Souchet 6. pro
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
Nicolas Krassas 4. pro
Collection of public security audits grouped by programming language
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
mik 29. stu
Odgovor korisniku/ci @silviocesare @Fox0x01
Imagine a world where nobody made PoCs anymore. Every changelog would look like Cisco's: " Bug that causes crash"
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
Rachit Nigam 19. stu
I want to start this trend in academic papers:
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
Justin Campbell 17. stu
Odgovor korisniku/ci @epakskape @pati_gallardo @artwongt
Because Microsoft already has a mature static analysis capability, our bugs are predominantly from fuzzing. A minority are from manual code review. Anecdotally, the majority of bounty-eligible external cases in Windows are from fuzzing.
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
CodeColorist 17. stu
KnownSec has just announced its bonus plan for zero day exploits. The highest is RMB 20M for a single exploit chain 🤔
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
axi0mX 🌧️📲 24. lis
": The iPhone Exploit That Hackers Use to Research Apple’s Most Sensitive Code" This is what the title of this write-up would be if it was a VICE article. This is a detailed write-up of the vulnerability I found and how the exploit really works.
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
Monta Elkins 12. lis
I'm excited that my chipping attack made I'll go into more detail about the attack and defenses in two weeks at the ICS security conference in Stockholm Sweden (with live demo). Hope to see you there!
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
j00ru//vx 10. lis
Odgovor korisniku/ci @j00ru
The effort was inspired by Fortinet's CVE-2018-1040 from last year. Original write-up: . Thanks!
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
Andreas Zeller 10. lis
What is it that makes modern fuzzers successful? (Hint: It might not be what you think, and this raises questions.)
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
SwiftOnSecurity 5. lis
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
LambdaConcept 27. ruj
Debugging an iPhone with Bonobo JTAG cable + OpenOCD + GDB demoted by ch...
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
Jeremiah Grossman 29. ožu
Any list of “the most important researchers of the last 30 years” that doesn’t include Solar Designer is just plain wrong.
Reply Retweet Označi sa "sviđa mi se"
cc proslijedio/la je tweet
Steve Christey Coley 17. ruj
We, the CWE Team (), are pleased to announce the release of the 2019 CWE Top 25 Most Dangerous Software Errors, the first release since 2011. We look forward to the community's insights and suggestions!
Reply Retweet Označi sa "sviđa mi se"