| Pretraživanje | Osvježi |
|
Infiltrate
@InfiltrateCon
|
3 h |
|
#INFILTRATE20 Speaker Highlight: Amy Burnett(@itszn13) will be presenting 'Diverting the Exploit Flow: On Browser Mitigation Effectiveness' infiltratecon.com/conference/spe… pic.twitter.com/VQGjzdeOKn
|
||
|
||
|
Infiltrate
@InfiltrateCon
|
28. sij |
|
We are pleased to announce INFILTRATE 2020 speaker Nitay Artenstein (@nitayart) presenting: The Promised Band: Winning Android Fragmentation with a MediaTek Baseband RCE infiltratecon.com/conference/spe…. #INFILTRATE20 pic.twitter.com/uzbm14Ee5j
|
||
|
||
|
Infiltrate
@InfiltrateCon
|
31. lis |
|
New training course alert!– Azeria Labs: Advanced IoT Exploit Development for ARM 32-bit. Sign up now before seats sell out! @Fox0x01 #Infiltrate20
infiltratecon.com/conference/tra… #Infiltrate20
|
||
|
|
||
|
Infiltrate
@InfiltrateCon
|
24. sij |
|
We are pleased to announce our first two INFILTRATE 2020 speakers: Marco Ivaldi (@0xdea) presenting: The INFILTRATE Effect: 6 Bugs in 6 Months & William Woodruff (@8x5clPW2) presenting: Destroying x86_64 Decoders with Differential Fuzzing. infiltratecon.com/conference/spe… #INFILTRATE20 pic.twitter.com/ziybbvySQA
|
||
|
||
|
Infiltrate
@InfiltrateCon
|
31. lis |
|
We are excited to announce Cristina Cifuentes of Oracle Labs Australia as the keynote speaker for INFILTRATE 2020. infiltratecon.com/conference/spe… #Infiltrate20 pic.twitter.com/V8EPBdoZHN
|
||
|
||
|
raptor
@0xdea
|
25. sij |
|
See you in Miami! This year I’ll talk about how to get from zero to zeroday. Not much information on how to become a vulnerability researcher out there, let’s change that! #INFILTRATE20 twitter.com/InfiltrateCon/…
|
||
|
|
||
|
Infiltrate
@InfiltrateCon
|
1. stu |
|
Unleash your inner reverse engineering dragon with Jeremy Blackthorne's Ghidra Training at #INFILTRATE20! For more information, visit infiltratecon.com/conference/tra… @0xJeremy
|
||
|
|
||
|
Infiltrate
@InfiltrateCon
|
4. velj |
|
#INFILTRATE20 Training Update: Azeria Labs (@Fox0x01): Advanced IoT Exploit Development for ARM 32-bit is officially SOLD OUT! But Jeremy Blackthorne (@0xJeremy): Reverse-Engineering with Ghidra is not. Register today! infiltratecon.com/conference/tra… pic.twitter.com/iDCXC799ec
|
||
|
||
|
Infiltrate
@InfiltrateCon
|
3. velj |
|
#INFILTRATE20 Speaker Highlight: Jonathan Afek (@JonathanAfek) will be presenting 'Simplifying iOS Research: Booting the iOS Kernel to an
Interactive Bash Shell on QEMU' infiltratecon.com/conference/spe… pic.twitter.com/V52jvW5hmq
|
||
|
||
|
Infiltrate
@InfiltrateCon
|
31. sij |
|
Low Ticket Alert! Azaria Labs (@Fox0x01): Advanced IoT Exploit Development for Arm 32-bit training class has only 4 seats left. #INFILTRATE20 infiltratecon.com/conference/tra… pic.twitter.com/qYRVg0HPVO
|
||
|
||
|
raptor
@0xdea
|
31. lis |
|
|
||
|
|
||