Twitter | Pretraživanje | |
HackSys Team
Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning
8.814
Tweetovi
312
Pratim
7.065
Osobe koje vas prate
Tweetovi
HackSys Team proslijedio/la je tweet
Niklas B 12 h
just found that this writeup for CVE-2019-9793, a range analysis bug in Spidermonkey found by and analyzed by me is now unrestricted: I thought it was a cool bug, although unfortunately Spectre mitigations prevented exploitation as far as I know
Reply Retweet Označi sa "sviđa mi se"
HackSys Team 23 h
I'll be giving out a free seat for the Windows Kernel Exploitation Foundation & Advanced (3 days) training course Goa 2020 to a woman in security with a keen interest in vulnerability research and exploit development. Please DM me if interested.
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
Ruben Santamarta 4. velj
Root cause analysis and exploit for a Windows kernel ws2ifsl.sys use-after-free vulnerability.
Reply Retweet Označi sa "sviđa mi se"
HackSys Team 3. velj
Reply Retweet Označi sa "sviđa mi se"
HackSys Team 3. velj
I'll be running my Windows Kernel Exploitation Advanced course (2 days) twice at BlackHat USA 2020 . Register for kernel pwning
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
Ghidra Ninja 2. velj
Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
Linus Henze 2. velj
I’ve just uploaded my Jailbreak for the iPad Pro (2017) to GitHub. Right now, SSH and Sileo can be installed. Due to lack of devices, I cannot currently implement support for other devices. Feel free to create PRs if you would like to help me!
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
Richard Feynman 2. velj
The ultimate test of your knowledge is your capacity to convey it to another.
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
InfoSect 2. velj
Pointer Compression in V8 and what it means for browser exploitation by
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
Yarden Shafir 2. velj
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
FireF0X 2. velj
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
Andrea Fioraldi 30. sij
Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
j00ru//vx 30. sij
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
Richard Feynman 30. sij
Feynman Lessons for Learning: 🧠 1) Understanding is more important than memorization! 2) Learn principles, not formulas. 3) Ask questions! 4) Read Books every day. 5) Teaching is a powerful tool to learning.
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
Eduardo Chavarro 29. sij
HEVD Exploits – Windows 7 x86 Arbitrary Write
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
maldiohead 30. sij
this is a xnu kernel info leak bug poc ,the bug which I found one year ago. I tested on 10.14.5 and iOS 13.2 it seems patched recently I don't know the CVE id.
Reply Retweet Označi sa "sviđa mi se"
HackSys Team proslijedio/la je tweet
James Forshaw 30. sij
A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is).
Reply Retweet Označi sa "sviđa mi se"
HackSys Team 30. sij
Odgovor korisniku/ci @CodeColorist
Shit 😷😷😷
Reply Retweet Označi sa "sviđa mi se"
HackSys Team 30. sij
Odgovor korisniku/ci @CodeColorist
Be careful mate!!
Reply Retweet Označi sa "sviđa mi se"
HackSys Team 30. sij
Odgovor korisniku/ci @h0mbre_ @CanSecWest @dragosr
Yes, taking both the classes is the best thing to do and a lot of people do that.
Reply Retweet Označi sa "sviđa mi se"