| Pretraživanje | Osvježi |
|
Cornelius Aschermann
@is_eqv
|
5. pro |
|
|
||
|
|
||
|
James Kettle
@albinowax
|
27. stu |
|
My final presentation of HTTP Desync Attacks will be at Black Hat Europe next week. New content includes a novel desync technique, major automation improvements, a defensive case-study, and updated bounty figures #BHEU blackhat.com/eu-19/briefing…
|
||
|
|
||
|
LimitedResults
@LimitedResults
|
6. pro |
|
Slides from #BHEU 2019 available here:
limitedresults.com/wp-content/upl… pic.twitter.com/s4gWbOqAUG
|
||
|
||
|
jonathan Afek
@JonathanAfek
|
27. sij |
|
Can't wait to present the progress we've made since #BHEU at @offensive_con! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer. #offensivecon pic.twitter.com/xfEaCdgraH
|
||
|
||
|
Niemand 🇦🇷
@niemand_sec
|
7. sij |
|
The recording of my talk "Unveiling the Underground World of Anti-Cheats" at BlackHat Europe 2019 is now online! :D
A pleasure to be part of @BlackHatEvents !!
youtube.com/watch?v=yJHyHU…
#BHEU #security #infosec
|
||
|
|
||
|
Black Hat
@BlackHatEvents
|
28. pro |
|
Five #BHEU Briefings recordings are now available on the #BlackHat YouTube Channel. Watch them here: ow.ly/501R50xJcQt
|
||
|
|
||
|
Niemand 🇦🇷
@niemand_sec
|
20. pro |
|
My @BlackHatEvents slides on "Unveiling the Underground Word of Anti-Cheats" are now available on the @Immunityinc site.
You can find additional information about bypasses to multiple Anticheats (new info at the end)
immunityinc.com/resources/pape…
#reversing #security #BHEU #Blackhat pic.twitter.com/PgsluKijFE
|
||
|
||
|
Matthias Luft
@uchi_mata
|
6. pro |
|
Slides and material from our talk on attacking container build systems from #BHEU are now online: github.com/heroku/bheu19-…
And so is Terrier, the CI-oriented container integrity verification tool (mainly due to the amazing effort of the @brompwnie): github.com/heroku/terrier/
|
||
|
|
||
|
Black Hat
@BlackHatEvents
|
5. pro |
|
Thanks to all of the #BHEU 2019 Arsenal Presenters, Attendees and of course the @ToolsWatch Team for a great showing of open-source tools! twitter.com/ToolsWatch/sta…
|
||
|
|
||
|
ToolsWatch - Hackers Arsenal 🛠️👁️
@ToolsWatch
|
5. pro |
|
Ok folks that's a wrap !!!! Thanks everyone for making this #BHEU Arsenal London 2019 an awesome place to catch up with old and new friends from all over the world !! Hugs to @Jasminanicolee Steve Rich and @BlackHatEvents ... Special hugs to our beloved chairhacker @MadelineS_M pic.twitter.com/XIGgArXX1n
|
||
|
||
|
Mohammed Aldoub
@Voulnet
|
5. pro |
|
للتو انتهيت من عرض أداة برق بنجاح في مؤتمر بلاكهات لندن بحمدالله.
Just finished presenting barq in #BHEU Arsenal.
Barq is the AWS post exploitation attack tool. Find it here:
github.com/Voulnet/barq
@ToolsWatch pic.twitter.com/HCYoMr1eUV
|
||
|
||
|
Decalage
@decalage2
|
5. pro |
|
Final slides of my presentation yesterday at Black Hat Europe 2019, about malicious VBA macros and recent advances in the attack & defence sides:
decalage.info/bheu2019
Featuring #oletools/olevba, ViperMonkey, MacroRaptor, EvilClippy
#BHEU #BHEU2019 pic.twitter.com/iT8iqvIM8E
|
||
|
||
|
Daniel Cuthbert
@dcuthbert
|
5. pro |
|
Ok ze little french car in ze box is all ready for @BlackHatEvents attendees to come and hack. Briefings attendee lounge on the 3rd at 10:25am.
We've got CAN devices to hand out and lots to play with #carhacking #BHEU pic.twitter.com/2G6mds4wU4
|
||
|
||
|
jonathan Afek
@JonathanAfek
|
4. pro |
|
It was an honor to present our research at #BHEU. Thanks everyone for attending. It was a pleasure to see the interest of the community and we promise to keep the progress going. For everyone who missed the talk: alephsecurity.com/2019/06/25/xnu… pic.twitter.com/r3UiYi5QMr
|
||
|
||
|
Chris Wysopal
@WeldPond
|
4. pro |
|
Interesting presentation on fuzzing at scale with Google’s ClusterFuzz #BHEU pic.twitter.com/wnhyEJ3G2T
|
||
|
||
|
Miriam Wiesner
@MiriamXyra
|
4. pro |
|
Do you want to know how to use Windows Event Logs to improve your detection, matched to MITRE ATT&CK? Join my session at @BlackHatEvents Arsenal station 6 at 3:45 p.m. and find out how my open source tool #EventList can help you!
#BHEU pic.twitter.com/z7GM3MGOUT
|
||
|
||
|
Ali Abbasi
@bl4ckic3
|
4. pro |
|
Today @ScepticCtf presented our work on Siemens S7-1200v4 bootloader reversing at #bheu. We will present more about Siemens ADONIS RTOS later this year at #36c3 and will present the most complete package including releasing the code for using the special access feature at #S4x20. pic.twitter.com/Q5E5ITLFfb
|
||
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
Next up...
I want to be James Kettle @albinowax when I grow up. He's singlehandedly made appsec sexy again after years of hardly any decent research. This little trick will make the bug bounty scene go mad.
#BHEU pic.twitter.com/BxjEgKRDW7
|
||
|
||
|
jan
@janfajfer
|
4. pro |
|
Insights into the business of a new Android botnet called Geost. @eldracote @anshirokova and @MaryJo_E revealing the secrets of a cybercrime group at #BlackHatEurope2019 #BlackHat #BHEU pic.twitter.com/XaXKwWXS6q
|
||
|
||
|
Grifter
@Grifter801
|
4. pro |
|
I'm sure when I look back at Black Hat Europe 2019, one of my favorite moments will be "That time @MalwareJake cosplayed as China." 😂 #bheu #blackhat pic.twitter.com/yRqMPM9CpY
|
||
|
||