Twitter | Pretraživanje | |
E1@y
Security researcher
1.086
Tweetovi
619
Pratim
89
Osobe koje vas prate
Tweetovi
E1@y proslijedio/la je tweet
checkra1n 11 h
checkra1n for Linux is now available at ! 🌧️📲 It’s been months of hard work in the making and we’re so glad to finally show it to you.
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
J is evolving past Darwin 2. velj
(CAI) is becoming future proof: Not only does it support all Code signing algorithms (SHA1 through SHA-512!), but also - the module - now uses an external argument pattern matching file, to easily edit and add any pattern you like!
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Brandon Azad 4. velj
If you're interested in bootstrapping iOS kernel security research on A13, keep an iPhone 11 on iOS 13.3. I will be releasing a proof-of-concept exploit that provides kernel read/write on iPhone12,3 17C54.
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Leandro Barragan 28. sij
[Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Ryan Hausknecht 28. sij
New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Caleb Fenton 25. sij
GDA is a Dalvik bytecode decompiler written in C++. It supports APK, DEX, ODEX and OAT files. Looks really cool, especially if you don't have JEB, but it's not open source yet.
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Caleb Fenton 25. sij
I'm working on a new project for Android reversers called Smali Debugger. It's like gdb but for Smali. It uses smalivm () for execution. Here's a quick video of me stepping through two similar methods.
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Project Zero Bugs 22. sij
Insufficient fix for CVE-2019-6205 means XNU vm_map_copy optimization which requires atomicity still isn't atomic
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Billy Ellis 18. sij
Just published a blog post talking about some iOS kernel framebuffer research I’ve been looking at over the last couple weeks. Have a read if you’re interested :)
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Siguza 18. sij
New blog post: cuck00 A XNU/IOKit info leak 1day killed in iOS 13.3.1 beta 2.
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Matt Hand 13. sij
I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
ϻг_ϻε 14. sij
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Giulio Zompetti 15. sij
This is a thread on what we know about Apple’s prototyping and development process of manufactured products. 1/ All info here could be incomplete/wrong/outdated. I may (or may not) update this thread in future if I have enough things to share 😁
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Hossein Lotfi 13. sij
Browser jit exploitation quick start: Phrack paper is the base: well-described video series: presentation in SSTIC 2019: Also:
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Mobile Security 10. sij
Android: ashmem readonly bypasses via remap_file_pages() and ASHMEM_UNPIN by
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Project Zero Bugs 9. sij
SLOP - A Userspace PAC Workaround
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Mobile Security 9. sij
Remote iPhone Exploitation 📱🔥 Part 1: Poking Memory via iMessage and CVE-2019-8641 Part 2: a Remote ASLR Bypass Part 3: Gaining Code Execution by and
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Mobile Security 8. sij
Making sense of Apple’s enterprise app distribution changes by
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Ben Hawkes 9. sij
Quick reminder that we're still updating the "0day detected in-the-wild" spreadsheet here: . The first entry for 2020 is now in the books -- CVE-2019-17026 is a type confusion issue in the JIT engine for Firefox, detected in active attacks by Qihoo 360 ATA.
Reply Retweet Označi sa "sviđa mi se"
E1@y proslijedio/la je tweet
Samuel Groß 9. sij
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:
Reply Retweet Označi sa "sviđa mi se"