Twitter | Search | |
Search Refresh
Boris Larin Feb 6
Retrospective on the Latest Zero-days Found in the Wild [SLIDES]
Reply Retweet Like
Costin Raiu 23 Jan 18
Reports of Twitter not working 3000 years ago greatly exaggerated
Reply Retweet Like
Lucas Leong 15 Feb 19
source code of my old fuzzer, pe-afl, which applies static binary instrumentation, aka binary rewriting, on PE file
Reply Retweet Like
x0rz 15 Feb 19
Here is the video of my talk from : No Code No Crime: UPnP as an Off-the-Shelf Attacker's Toolkit (video)
Reply Retweet Like
BlueHat IL Oct 23
CFP for 2020 is open! Submit now for a chance to take the stage.
Reply Retweet Like
b33f 3 Feb 18
The talks are online, go watch all the things 😎 =>
Reply Retweet Like
x0rz 7 Feb 19
Percentage of zero-days being used is raising. As security improves we'll have to deal more often with that, good days ahead for ... talk by (MSRC)
Reply Retweet Like
Costin Raiu 1 Jan 19
I’m deeply honored to be speaking at for the third year in a row. My presentation will focus on finding anomalies in UEFI PE and Terse Executables and the odd stuff we spotted so far through code similarity:
Reply Retweet Like
John Lambert 26 Jan 18
At I spoke about how innovators are improving security on data by using data to improve security. More and more security controls are using data/telemetry as the heart of their insight. PDF:
Reply Retweet Like
Nate Warfield Feb 10
- I just uploaded the slides from my talk.
Reply Retweet Like
Microsoft Security Intelligence 14 Feb 19
Watch: Bhavna Soman ()'s presentation on using ML and custom entity extraction techniques from natural language processing to extract STIX-like info from unstructured text like blogs, whitepapers, reports for threat intelligence
Reply Retweet Like
Maddie Stone Feb 6
Here are the slides for my presentation today at on variant analysis for 0-days used in the wild. I discuss 3 case studies, covering the approach, findings, and lessons learned.
Reply Retweet Like
Costin Raiu 23 Jan 18
When Microsoft finds zero days in Google software
Reply Retweet Like
Gal De Leon Feb 6
Here are the slides for the talk I gave yesterday at - "Exploiting Errors in Windows Error Reporting". I discuss the bug class, explain how WER works, and show 3 vulnerabilities I discovered and how I exploited them
Reply Retweet Like
Costin Raiu Feb 6
0days from the Chainshot framework with hardcoded internal names, starting with letters from “A” to “J”. 6 are still missing / undiscovered
Reply Retweet Like
hasherezade 8 Feb 19
Replying to @hasherezade
just imagine a conference where every talk gets its own poster... and it was just one of many creative details prepared by 's organizers, to spice up the whole event
Reply Retweet Like
Boris Larin Feb 5
Did you enjoy "Overview of the latest Windows OS kernel exploits found in the wild" ? It was about 0days that we found in 2018. Tomorrow at I present Part 2 about stuff that we found in 2019.
Reply Retweet Like
BlueHat IL Feb 6
Modern process injection and payload evasion done right. and on modern .NET tradecraft to keep your exploits under the radar
Reply Retweet Like
Ulf Frisk 14 Feb 19
My talk about MemProcFS, Total Meltdown and HW Cheating! Lots of demos - remote memory capture, point and click memory analysis using virtual File System and Python API.
Reply Retweet Like
b33f Feb 15
I wanted to highlight some of the foundational capabilities that we introduced into SharpSploit as part of our talk --> Manual mapping, generic Syscalls & dynamic module/function resolution. Simple usage examples here =>
Reply Retweet Like