Twitter | Pretraživanje | |
Taha Ibrahim Draïdia
Hacker at interested in reverse engineering, binary exploitation, exploit development and web application security.
658
Tweetovi
137
Pratim
153
Osobe koje vas prate
Tweetovi
Taha Ibrahim Draïdia proslijedio/la je tweet
checkra1n 5. velj
checkra1n for Linux is now available at ! 🌧️📲 It’s been months of hard work in the making and we’re so glad to finally show it to you.
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
Adam Chester 1. velj
Myself and are off to USA 2020 to deliver our Adversary Simulation and Red Team Tactics course. Stay tuned for some upcoming posts on how the supporting labs were created
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
MDSec 30. sij
And next up to the have Taha talking about Kubernetes for pentesters! 👍
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
Ghidra 15. sij
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
Rasta Mouse 12. sij
Looks like I got the whole BlockDLLs thing working in C#. Quite a trivial exercise thanks to 's example in C:
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
MDSec 10. sij
Deep Dive to Citrix ADC Remote Code Execution, CVE-2019-19781, new blog post By
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
Dominic Chell 10. sij
This was a really interesting bug and really good work by to exploit it... Perl 😱😱😱
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia 6. sij
Odgovor korisniku/ci @domchell @_xpn_
😂
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
Jamie Shaw 6. sij
Adding CVE to muted words, FFS 🤦‍♂️
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
Maddie Stone 14. velj
I get asked all the time how to get started in binary RE. There are tons of great resources out there, so #1 is just get started with something, anything! But if you're open to suggestions for building a strong, general reverse engineering foundation, here are my suggestions:
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia 4. sij
Odgovor korisniku/ci @_xpn_ @0x09AL i 3 ostali
😂
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
Mike Felch 4. sij
DropBox privilege escalation in Windows using hardlinks. Great read and great research by !
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
h0mbre 21. pro
Last project of 2019. I created an image-based C2 channel proof of concept that posts/retrieves stego'd images on Imgur. As a PoC only, I've simulated a proper implant in Python. The Framework is called Dali, after the artist. For fun & to learn!
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
Cutter 6. ruj
Odgovor korisniku/ci @radareorg
Ghidra's decompiler is written in C++, hence it was trivial to implement a full integration. The new version of Cutter is shipped with a new plugin we wrote for Cutter and . NO JAVA INVOLVED. You can find the plugin and more info here --> >>
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
Swissky 19. pro
Bypass SSL Pinning and intercept HTTPS with Burp with apk-mitm - A CLI application that automatically prepares Android APK files for HTTPS inspection
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
Hanqing Zhao 13. pro
I wrote a thing about JSC exploitation (including how to leak StructureID) and Safari sandbox escape.
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
buherator 11. pro
Qualys Security Advisory - Local Privilege Escalation in OpenBSD's dynamic loader (CVE-2019-19726) < Beautiful! Wonder how found it?
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
Ian Coldwater 6. pro
"A remote attacker can access vulnerable services with any password by entering the username as "-schallenge" or "-schallenge: passwd" bc a dash (-) before username tricks OpenBSD into interpreting the value as a command-line option and not as a username."
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
Yellow Flag 2. pro
My first article on antivirus, detailing a bunch of issues rendering its web protection component ineffective. There will be more interesting findings to publish later.
Reply Retweet Označi sa "sviđa mi se"
Taha Ibrahim Draïdia proslijedio/la je tweet
spidersec 29. stu
HTTP Request Smuggling in one Screenshot. 🙂
Reply Retweet Označi sa "sviđa mi se"