Twitter | Pretraživanje | |
Pretraživanje Osvježi
Cornelius Aschermann 5. pro
Slides for and my talk on fuzzing at are now available:
Reply Retweet Označi sa "sviđa mi se"
James Kettle 27. stu
My final presentation of HTTP Desync Attacks will be at Black Hat Europe next week. New content includes a novel desync technique, major automation improvements, a defensive case-study, and updated bounty figures
Reply Retweet Označi sa "sviđa mi se"
LimitedResults 6. pro
Reply Retweet Označi sa "sviđa mi se"
jonathan Afek 27. sij
Can't wait to present the progress we've made since at ! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.
Reply Retweet Označi sa "sviđa mi se"
Niemand 🇦🇷 7. sij
The recording of my talk "Unveiling the Underground World of Anti-Cheats" at BlackHat Europe 2019 is now online! :D A pleasure to be part of !!  
Reply Retweet Označi sa "sviđa mi se"
Black Hat 28. pro
Five Briefings recordings are now available on the YouTube Channel. Watch them here:
Reply Retweet Označi sa "sviđa mi se"
Niemand 🇦🇷 20. pro
My slides on "Unveiling the Underground Word of Anti-Cheats" are now available on the site. You can find additional information about bypasses to multiple Anticheats (new info at the end)
Reply Retweet Označi sa "sviđa mi se"
Matthias Luft 6. pro
Slides and material from our talk on attacking container build systems from are now online: And so is Terrier, the CI-oriented container integrity verification tool (mainly due to the amazing effort of the ):
Reply Retweet Označi sa "sviđa mi se"
Black Hat 5. pro
Thanks to all of the 2019 Arsenal Presenters, Attendees and of course the Team for a great showing of open-source tools!
Reply Retweet Označi sa "sviđa mi se"
ToolsWatch - Hackers Arsenal 🛠️👁️‍ 5. pro
Ok folks that's a wrap !!!! Thanks everyone for making this Arsenal London 2019 an awesome place to catch up with old and new friends from all over the world !! Hugs to Steve Rich and ... Special hugs to our beloved chairhacker
Reply Retweet Označi sa "sviđa mi se"
Mohammed Aldoub 5. pro
للتو انتهيت من عرض أداة برق بنجاح في مؤتمر بلاكهات لندن بحمدالله. Just finished presenting barq in Arsenal. Barq is the AWS post exploitation attack tool. Find it here:
Reply Retweet Označi sa "sviđa mi se"
Decalage 5. pro
Final slides of my presentation yesterday at Black Hat Europe 2019, about malicious VBA macros and recent advances in the attack & defence sides: Featuring /olevba, ViperMonkey, MacroRaptor, EvilClippy
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 5. pro
Ok ze little french car in ze box is all ready for attendees to come and hack. Briefings attendee lounge on the 3rd at 10:25am. We've got CAN devices to hand out and lots to play with
Reply Retweet Označi sa "sviđa mi se"
jonathan Afek 4. pro
It was an honor to present our research at . Thanks everyone for attending. It was a pleasure to see the interest of the community and we promise to keep the progress going. For everyone who missed the talk:
Reply Retweet Označi sa "sviđa mi se"
Chris Wysopal 4. pro
Interesting presentation on fuzzing at scale with Google’s ClusterFuzz
Reply Retweet Označi sa "sviđa mi se"
Miriam Wiesner 4. pro
Do you want to know how to use Windows Event Logs to improve your detection, matched to MITRE ATT&CK? Join my session at Arsenal station 6 at 3:45 p.m. and find out how my open source tool can help you!
Reply Retweet Označi sa "sviđa mi se"
Ali Abbasi 4. pro
Today presented our work on Siemens S7-1200v4 bootloader reversing at . We will present more about Siemens ADONIS RTOS later this year at and will present the most complete package including releasing the code for using the special access feature at .
Reply Retweet Označi sa "sviđa mi se"
Daniel Cuthbert 4. pro
Next up... I want to be James Kettle when I grow up. He's singlehandedly made appsec sexy again after years of hardly any decent research. This little trick will make the bug bounty scene go mad.
Reply Retweet Označi sa "sviđa mi se"
jan 4. pro
Insights into the business of a new Android botnet called Geost. and revealing the secrets of a cybercrime group at
Reply Retweet Označi sa "sviđa mi se"
Grifter 4. pro
I'm sure when I look back at Black Hat Europe 2019, one of my favorite moments will be "That time cosplayed as China." 😂
Reply Retweet Označi sa "sviđa mi se"