|
HackSys Team
@
HackSysTeam
India
|
|
Vulnerability Research, Kernel Exploitation, Reverse Engineering, Exploit Development, Program Analysis, Malware Research, Web, Machine Learning
|
|
|
8.814
Tweetovi
|
312
Pratim
|
7.065
Osobe koje vas prate
|
| Tweetovi |
| HackSys Team proslijedio/la je tweet | ||
|
Niklas B
@_niklasb
|
12 h |
|
just found that this writeup for CVE-2019-9793, a range analysis bug in Spidermonkey found by @bkth_ and analyzed by me is now unrestricted: bug1528829.bmoattachments.org/attachment.cgi…
I thought it was a cool bug, although unfortunately Spectre mitigations prevented exploitation as far as I know
|
||
|
|
||
|
HackSys Team
@HackSysTeam
|
23 h |
|
I'll be giving out a free seat for the Windows Kernel Exploitation Foundation & Advanced (3 days) training course
@nullcon Goa 2020 to a woman in security with a keen interest in vulnerability research and exploit development. Please DM me if interested.
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
Ruben Santamarta
@reversemode
|
4. velj |
|
Root cause analysis and exploit for a Windows kernel ws2ifsl.sys use-after-free vulnerability.
labs.bluefrostsecurity.de/blog/2020/01/0…
|
||
|
|
||
|
HackSys Team
@HackSysTeam
|
3. velj |
|
|
||
|
HackSys Team
@HackSysTeam
|
3. velj |
|
I'll be running my Windows Kernel Exploitation Advanced course (2 days) twice at BlackHat USA 2020 @BlackHatEvents. Register for kernel pwning
blackhat.com/us-20/training…
blackhat.com/us-20/training…
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
Ghidra Ninja
@ghidraninja
|
2. velj |
|
Finally released part 2 of my »Reversing #WannaCry with #Ghidra« series!
In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.
youtube.com/watch?v=Q90uZS…
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
Linus Henze
@LinusHenze
|
2. velj |
|
I’ve just uploaded my Jailbreak for the iPad Pro (2017) to GitHub. Right now, SSH and Sileo can be installed. Due to lack of devices, I cannot currently implement support for other devices. Feel free to create PRs if you would like to help me!
github.com/LinusHenze/Fugu
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
Richard Feynman
@ProfFeynman
|
2. velj |
|
The ultimate test of your knowledge is your capacity to convey it to another. pic.twitter.com/nV4YQdn5ZU
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
InfoSect
@infosectcbr
|
2. velj |
|
Pointer Compression in V8 and what it means for browser exploitation by @farazsth98 blog.infosectcbr.com.au/2020/02/pointe…
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
Yarden Shafir
@yarden_shafir
|
2. velj |
|
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't.
@aionescu and I wrote about these!
windows-internals.com/dkom-now-with-…
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
FireF0X
@hFireF0X
|
2. velj |
|
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore, github.com/hfiref0x/KDU pic.twitter.com/s154qYlIKR
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
Andrea Fioraldi
@andreafioraldi
|
30. sij |
|
Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov.
github.com/vanhauser-thc/…
I used it to build the Redqueen mutator in AFL++!
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
j00ru//vx
@j00ru
|
30. sij |
|
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy! googleprojectzero.blogspot.com/2020/01/part-i…
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
Richard Feynman
@ProfFeynman
|
30. sij |
|
Feynman Lessons for Learning: 🧠
1) Understanding is more important than memorization!
2) Learn principles, not formulas.
3) Ask questions!
4) Read Books every day.
5) Teaching is a powerful tool to learning. pic.twitter.com/lU8aE8TI6q
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
Eduardo Chavarro
@EChavarro
|
29. sij |
|
HEVD Exploits – Windows 7 x86 Arbitrary Write
h0mbre.github.io/HEVD_AbitraryW…
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
maldiohead
@ma1fan
|
30. sij |
|
this is a xnu kernel info leak bug poc ,the bug which I found one year ago.
I tested on 10.14.5 and iOS 13.2
it seems patched recently
I don't know the CVE id.
github.com/maldiohead/xnu…
|
||
|
|
||
| HackSys Team proslijedio/la je tweet | ||
|
James Forshaw
@tiraniddo
|
30. sij |
|
A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is). tiraniddo.dev/2020/01/dont-u…
|
||
|
|
||
|
HackSys Team
@HackSysTeam
|
30. sij |
|
Shit 😷😷😷
|
||
|
|
||
|
HackSys Team
@HackSysTeam
|
30. sij |
|
Be careful mate!!
|
||
|
|
||
|
HackSys Team
@HackSysTeam
|
30. sij |
|
Yes, taking both the classes is the best thing to do and a lot of people do that.
|
||
|
|
||