Twitter | Pretraživanje | |
flanker017
242
Tweetovi
322
Pratim
3.488
Osobe koje vas prate
Tweetovi
flanker017 27. stu
Odgovor korisniku/ci @CodeColorist
researcher lives matter
Reply Retweet Označi sa "sviđa mi se"
flanker017 25. stu
Odgovor korisniku/ci @CodeColorist
xswl
Reply Retweet Označi sa "sviđa mi se"
flanker017 proslijedio/la je tweet
axi0mX 🌧️📲 10. stu
available now!
Reply Retweet Označi sa "sviđa mi se"
flanker017 7. stu
Reply Retweet Označi sa "sviđa mi se"
flanker017 6. stu
Text-To-Speech speaks pwned: writeup for CVE-2019-16253, how a benign TTS language pack lead to system shell.
Reply Retweet Označi sa "sviđa mi se"
flanker017 17. lis
Odgovor korisniku/ci @tautology0 @n_o_t_h_a_n_k_s
Yep, except for that does not come with process info
Reply Retweet Označi sa "sviđa mi se"
flanker017 16. lis
The second writeup: examining and exploiting android vendor binder services-part1. Writeup for CVE-2018-9143, plus an interesting reversing quirk: where is my vtable?
Reply Retweet Označi sa "sviđa mi se"
flanker017 proslijedio/la je tweet
Maddie Stone 4. lis
Kernel privilege escalation bug in Android affecting fully patched Pixel 2 & others. Reported under 7 day deadline due to evidence of in-the-wild exploit. and I quickly wrote a POC to get arbitrary kernel r/w using this bug, released in tracker.
Reply Retweet Označi sa "sviđa mi se"
flanker017 30. ruj
A new era for iOS Security Research
Reply Retweet Označi sa "sviđa mi se"
flanker017 28. ruj
Releasing Bindump4j, a utility to find owner/user process for given binder service, which is the starting point for most vendor services bug hunting. Idea based on 's , with quite some improvements, e.g post-N support. Checkout details at
Reply Retweet Označi sa "sviđa mi se"
flanker017 12. ruj
Odgovor korisniku/ci @SushiDude @NAKsecurity @MITREcorp
Lol sure I will :)
Reply Retweet Označi sa "sviđa mi se"
flanker017 12. ruj
Odgovor korisniku/ci @NAKsecurity @MITREcorp @SushiDude
Also thanks for :)
Reply Retweet Označi sa "sviđa mi se"
flanker017 12. ruj
Odgovor korisniku/ci @NAKsecurity @MITREcorp @SushiDude
Thank you. MITRE just replied with CVE-2019-16253, maybe someone saw this tweet.
Reply Retweet Označi sa "sviđa mi se"
flanker017 proslijedio/la je tweet
Pwn20wnd 18. kol
unc0ver v3.5.0 is NOW OUT with iOS 12.4 support for A7-A11 devices (Latest and signed firmware)! GitHub releases: Reddit post:
Reply Retweet Označi sa "sviđa mi se"
flanker017 proslijedio/la je tweet
Ben Hawkes 7. kol
Project Zero blog: "The Fully Remote Attack Surface of the iPhone" by Natalie Silvanovich () -
Reply Retweet Označi sa "sviđa mi se"
flanker017 6. kol
Hello everyone, long time no see! Now begins a series of blog posts about bugs I found and reported of various Android vendors. This very first one is about the exploit chain we used to get remote arbitrary application install on Galaxy S8. Plz enjoy:
Reply Retweet Označi sa "sviđa mi se"
flanker017 27. svi
Every party must come to an end, however memories will be cherished. Although I've left for more than one year already, great moments at are still like diamonds forever.
Reply Retweet Označi sa "sviđa mi se"
flanker017 20. stu 2017.
Odgovor korisniku/ci @mobilesecurity_
Details will be disclosed after Samsung fixes them
Reply Retweet Označi sa "sviđa mi se"
flanker017 20. stu 2017.
Odgovor korisniku/ci @ilkkav
Yes, Samsung has been notified and they are working on those bugs
Reply Retweet Označi sa "sviđa mi se"
flanker017 20. stu 2017.
Odgovor korisniku/ci @ilkkav
The demo is made in November so the next update of the October patch should fix the vulns
Reply Retweet Označi sa "sviđa mi se"