Twitter | Pretraživanje | |
echo
67
Tweetovi
40
Pratim
41
Osobe koje vas prate
Tweetovi
echo proslijedio/la je tweet
Matt Miller 19. srp
Interested in memory safety exploits & mitigations? Here's a new research paper that explores an ISA extension which tries to make it more difficult to corrupt pointers. All feedback on the security efficacy and overall design is appreciated :)
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Jeremy Fetiveau 19. lip
Just uploaded on my slides for my talk on exploiting chrome by attacking TurboFan. Thanks for the opportunity to present :-)
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Dave dwizzzle Weston 31. svi
I posted the slides from my talk: "advancing windows security" at
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Wen Xu 24. svi
Here is the slides of the talk on ZeroCon 2019 (DOM fuzzing part) by me and Soyeon Park (). I will open source my WebGL fuzzer when having time.
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Samuel Groß 7. svi
Odgovor korisniku/ci @0x41con
Also here are the slides from my talk about these exploit primitives with some more examples:
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Samuel Groß 7. svi
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Bruno Keith 16. svi
New blog post written together with my friend about using the JIT to abuse a non-JIT bug in Chakra (CVE-2019-0812)
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Meysam Firouzi 16. tra
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
zenhumany 30. ožu
The slides about our () topic can download now! enjoy it! if you have any question, please contact us!
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Samuel Groß 20. ožu
Fuzzilli, my JavaScript engine fuzzer, is now open source: \o/ Keep an eye on the Project Zero bugtracker in the next few weeks for some of the bugs found with it. Also let me know if you encounter any problems when using it! :)
Reply Retweet Označi sa "sviđa mi se"
echo 15. ožu
it's working over http ?
Reply Retweet Označi sa "sviđa mi se"
echo 8. ožu
Moja koszulka do spania właśnie do mnie jedzie hyhyhy 😁
Reply Retweet Označi sa "sviđa mi se"
echo 1. ožu
Moja darowizna na rzecz została właśnie przekazana. Wspieraj bezpłatną wiedzę!
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
nedwill 20. stu 2018.
Merry Thanksgiving everyone! I've decided to release my Chrome IPC slides early. I'll have some new content for 35c3 that's way more beginner friendly, but until then feel free to DM/comment questions. Thanks to for organizing <3
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Samuel Groß 13. stu 2018.
My talk on JIT compilers and CVE-2018-4233 is now on youtube: Slides are here:
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Ivan Fratric 4. lis 2018.
You might not be able to place a hardware implant into Apple's datacenter, but you can still run my open-source DOM fuzzer and own Safari :-)
Reply Retweet Označi sa "sviđa mi se"
echo 28. kol 2018.
Hacker Discloses Unpatched Windows Zero-Day Vulnerability (With PoC) przez
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Samuel Groß 9. kol 2018.
Here are the slides from my talk about just-in-time compilers for JavaScript and the bug I used as part of my Pwn2Own chain this year =)
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Haifei Li 3. tra 2018.
“Shellcodes are for the 99%” , Bing has released the slides for talk, be sure to check it out, it’s cool!
Reply Retweet Označi sa "sviđa mi se"
echo proslijedio/la je tweet
Rh0 28. velj 2018.
Here are my presentation slides ("From Assembly to Javascript and back"). Code will be released soon!
Reply Retweet Označi sa "sviđa mi se"