Twitter | Pretraživanje | |
Ahn Ki Chan
Bughunting & Exploitation
1.469
Tweetovi
301
Pratim
2.848
Osobe koje vas prate
Tweetovi
Ahn Ki Chan 24. sij
Odgovor korisniku/ci @CodeColorist
Stay safe man 😷
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
Boris Larin 21. sij
Hacking Sony PlayStation Blu-ray Drives [SLIDES]
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
Siguza 18. sij
New blog post: cuck00 A XNU/IOKit info leak 1day killed in iOS 13.3.1 beta 2.
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
Yarden Shafir 16. sij
After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
GitHub Security Lab 15. sij
Assert yourself on the browser playground with ’s guide to hunting Chrome IPC sandbox escapes:
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
ϻг_ϻε 14. sij
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan 12. sij
Odgovor korisniku/ci @itszn13 @bl4sty i 2 ostali
"I disassembled the game, analyzed its logic, pulled out the routines that mattered for gameplay, and rewrote them all in C++." "After about a year of execution time on six CPU cores, I'd finally evaluated everything to a satisfactory point to assemble and produce this TAS."
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan 12. sij
Odgovor korisniku/ci @itszn13 @bl4sty i 2 ostali
I like how they categorize their code execution TASes as "ACE" :) Even without ACE, some TASes get really extreme to the point where you start thinking "Wow, they put in all that effort just to make an optimized gameplay..." Such as this one :
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan 11. sij
Odgovor korisniku/ci @q3k
The idea behind WW barrier skip is beautiful as well :)
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan 11. sij
Odgovor korisniku/ci @q3k
And also recently, Ocarina of Time :)
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
Samuel Groß 9. sij
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
Blue Frost Security 7. sij
Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
Siguza 7. sij
New blog post. ARM hardware bug. In the specification.
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
KEENLAB 2. sij
Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan 1. sij
Odgovor korisniku/ci @icrackthecode @vonbloke i 4 ostali
Cheers man! I believe 2020 is going to be very big and special for you, Rock on and keep pwning! :D
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
Mobile Security 30. pro
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
Mobile Security 29. pro
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
Saar Amar 29. pro
The talk by about building KTRW is up! Great work by an amazing guy :) This was a serious year for iOS research, a lot of non trivial gaps have been crossed by the great community :)
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
flyyy 28. pro
Our 36c3 presentation video : and slides: 😃 It's really a nice party. Hope to see you next year.
Reply Retweet Označi sa "sviđa mi se"
Ahn Ki Chan proslijedio/la je tweet
~ 28. pro
untethered+unsandboxed code execution based on /cc
Reply Retweet Označi sa "sviđa mi se"