Twitter | Pretraživanje | |
Sirko
I'm a linux nerd ;) Vulnerability Research und Fuzzing
69
Tweetovi
131
Pratim
42
Osobe koje vas prate
Tweetovi
Sirko proslijedio/la je tweet
Kostya Serebryany 30. sij
HWASAN (think of it as ASAN v2) has become available to developers on Android outside of Google. If you use C or C++ on Android, please give it a try. HWASAN is also available on Aarch64 Linux with a recent kernel.
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Christian Hartlage 1. velj
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Code Intelligence 20. sij
found 12 CVEs in Suricata with libFuzzer. Read more about it in his war story. You can find the full report here:
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
catenacyber 15. sij
with then you realize `grep memcpy` is still powerful to find vulnerabilities : CVE-2020-2573 (stack buffer overflow in libmysql out of bounds write) totally fixed in latest critical patch update
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
ET Labs 13. sij
Just pushed out-of-band rule 2029255 - ET EXPLOIT Possible Citrix Application Delivery Controller Arbitrary Code Execution Attempt (CVE-2019-19781) M2 (exploit.rules) for additional coverage
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Code Intelligence 13. sij
In this interview, our co-founder explains the advantages of in continuous integration. Read the full article
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Code Intelligence 10. sij
The new year has already started and it is time for Bonn Security Night. We invite all , and enthusiasts to join us: 21.01.20, 18:30 o'clock in the office of . See you there!
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Samuel Groß 9. sij
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Dmitry Vyukov 9. sij
Another "nice" kernel bug that literally allows to write any memory on the machine by any user (you just give kernel any exact physical or virtual address): Again, killed before making it into any release:
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Andrey Konovalov 8. sij
Linux Kernel Runtime Guard (LKRG) bypass collection by Ilya Matveychikov, CC
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Josh Stroschein 7. sij
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Code Intelligence 24. pro
An exciting year is coming to an end. The Code Intelligence Team would like to take this opportunity to thank you for your support and the good cooperation. We look forward to a successful new year with new exciting challenges. We wish you cozy holidays and a happy new year.
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Kostya Serebryany 13. pro
Running libFuzzer in a browser, via WASM. We need to go deeper (?)
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Suricata IDS/IPS 13. pro
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Suricata IDS/IPS 13. pro
Announcing the 5.0.1 release: Fixing lots of issues in 5.0 and improving performance.
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
catenacyber 13. pro
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
nedwill 10. pro
Learn how found and exploited SockPuppet for iOS 12.4, featuring a bonus collaboration with LiveOverflow!
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Code Intelligence 3. pro
Don't miss out on our talk 'Developers Are Not the Enemy!' tomorrow at 16:45 in Sindelfingen at the Embedded Software Engineering Congress. and Paul Corrales will tell you more about the human factor, fuzzing and the future of secure software.
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
OISF 2. pro
Today ONLY - 20% off current training like TWO 2-day "live" events in Washington DC with and and 5-day Dev Deep Dive in Berlin with ! Don't miss it - details here . Discount code? Email us, info@oisf.net.
Reply Retweet Označi sa "sviđa mi se"
Sirko proslijedio/la je tweet
Kostya Serebryany 27. stu
Matt Morehouse's talk on GWP-ASan is out.
Reply Retweet Označi sa "sviđa mi se"