| Tweetovi |
|
flanker017
@flanker_hqd
|
27. stu |
|
researcher lives matter
|
||
|
|
||
|
flanker017
@flanker_hqd
|
25. stu |
|
xswl
|
||
|
|
||
| flanker017 proslijedio/la je tweet | ||
|
axi0mX 🌧️📲
@axi0mX
|
10. stu |
|
|
||
|
|
||
|
flanker017
@flanker_hqd
|
7. stu |
|
The exp has been uploaded. github.com/flankerhqd/ven…. twitter.com/flanker_hqd/st… pic.twitter.com/OFaP3KS0W5
|
||
|
|
||
|
flanker017
@flanker_hqd
|
6. stu |
|
blog.flanker017.me/text-to-speech… Text-To-Speech speaks pwned: writeup for CVE-2019-16253, how a benign TTS language pack lead to system shell.
|
||
|
|
||
|
flanker017
@flanker_hqd
|
17. lis |
|
Yep, except for that does not come with process info
|
||
|
|
||
|
flanker017
@flanker_hqd
|
16. lis |
|
The second writeup: examining and exploiting android vendor binder services-part1. Writeup for CVE-2018-9143, plus an interesting reversing quirk: where is my vtable? blog.flanker017.me/examining-and-…
|
||
|
|
||
| flanker017 proslijedio/la je tweet | ||
|
Maddie Stone
@maddiestone
|
4. lis |
|
Kernel privilege escalation bug in Android affecting fully patched Pixel 2 & others. Reported under 7 day deadline due to evidence of in-the-wild exploit. @tehjh and I quickly wrote a POC to get arbitrary kernel r/w using this bug, released in tracker. bugs.chromium.org/p/project-zero…
|
||
|
|
||
|
flanker017
@flanker_hqd
|
30. ruj |
|
A new era for iOS Security Research twitter.com/axi0mX/status/…
|
||
|
|
||
|
flanker017
@flanker_hqd
|
28. ruj |
|
Releasing Bindump4j, a utility to find owner/user process for given binder service, which is the starting point for most vendor services bug hunting. Idea based on @Morpheus______ 's , with quite some improvements, e.g post-N support. Checkout details at github.com/flankerhqd/bin…
|
||
|
|
||
|
flanker017
@flanker_hqd
|
12. ruj |
|
Lol sure I will :)
|
||
|
|
||
|
flanker017
@flanker_hqd
|
12. ruj |
|
Also thanks for @SushiDude :)
|
||
|
|
||
|
flanker017
@flanker_hqd
|
12. ruj |
|
Thank you. MITRE just replied with CVE-2019-16253, maybe someone saw this tweet.
|
||
|
|
||
| flanker017 proslijedio/la je tweet | ||
|
Pwn20wnd
@Pwn20wnd
|
18. kol |
|
unc0ver v3.5.0 is NOW OUT with iOS 12.4 support for A7-A11 devices (Latest and signed firmware)!
GitHub releases: github.com/pwn20wndstuff/…
Reddit post: reddit.com/r/jailbreak/co…
|
||
|
|
||
| flanker017 proslijedio/la je tweet | ||
|
Ben Hawkes
@benhawkes
|
7. kol |
|
Project Zero blog: "The Fully Remote Attack Surface of the iPhone" by Natalie Silvanovich (@natashenka) - googleprojectzero.blogspot.com/2019/08/the-fu…
|
||
|
|
||
|
flanker017
@flanker_hqd
|
6. kol |
|
Hello everyone, long time no see! Now begins a series of blog posts about bugs I found and reported of various Android vendors. This very first one is about the exploit chain we used to get remote arbitrary application install on Galaxy S8. Plz enjoy: blog.flanker017.me/galaxy-leapfro…
|
||
|
|
||
|
flanker017
@flanker_hqd
|
27. svi |
|
Every party must come to an end, however memories will be cherished. Although I've left for more than one year already, great moments at @keen_lab are still like diamonds forever. twitter.com/chenliang0817/…
|
||
|
|
||
|
flanker017
@flanker_hqd
|
20. stu 2017. |
|
Details will be disclosed after Samsung fixes them
|
||
|
|
||
|
flanker017
@flanker_hqd
|
20. stu 2017. |
|
Yes, Samsung has been notified and they are working on those bugs
|
||
|
|
||
|
flanker017
@flanker_hqd
|
20. stu 2017. |
|
The demo is made in November so the next update of the October patch should fix the vulns
|
||
|
|
||