Twitter | Pretraživanje | |
j00ru//vx
Windows hacker & vulnerability researcher. Google Project Zero.
1.215
Tweetovi
813
Pratim
31.972
Osobe koje vas prate
Tweetovi
j00ru//vx 30. sij
Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx proslijedio/la je tweet
Gynvael Coldwind 20. sij
If you're into programming, hacking, retro computers, electronics, etc check out our free magazine: 💾 Issues #1 and #2 are already out! For Issue #3 we're looking for: - Articles and Art! - Free community ads! - And sponsorship ads! Deadline: 20.02.20
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx 14. sij
Odgovor korisniku/ci @IgorSkochinsky
Ideally type info too. I might end up writing some simple script for the current project, but just wanted to make sure I was not missing anything obvious.
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx 13. sij
Anyone know if it's possible to have IDA load debug symbols embedded in the "stabs" format (), in a clean install or with some plugin? Or any other static analysis tools that support stabs other than objdump?
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx proslijedio/la je tweet
Samuel Groß 9. sij
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx proslijedio/la je tweet
Tim Willis 7. sij
At Google Project Zero, the team spends a *lot* of time discussing and evaluating vulnerability disclosure policies and their consequences. It's a complex and controversial topic! Here's P0's policy changes for 2020 (with our rationale for the changes):
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx proslijedio/la je tweet
Dragon Sector 2. sij
2019 was a great year for Dragon Sector! 🏆1st place at global ranking for the 2nd year in a row & 3rd time in the history of our team 🥇1st place at 2 CTFs 🥈2nd place at 5 CTFs 🥉3rd place at 5 CTFs 💻And also organized a well received Dragon CTF 2019!
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx proslijedio/la je tweet
optimyze.cloud 9. pro
We are hiring! Work on extremely interesting tech in a small and friendly team. Have big impact. Reduce computational waste, save customers money, reduce energy waste/CO2, and have fun while doing so. Full job description here:
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx proslijedio/la je tweet
Tetrane 17. pro
Timeless Analysis of an out-of-bounds read in a TTF font file using REVEN -2019-1244
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx proslijedio/la je tweet
Maddie Stone 21. stu
Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx proslijedio/la je tweet
Gynvael Coldwind 20. stu
Paged Out! #2 (Nov 2019) is out! And it's free to download :) This issue has 55 articles in 11 categories: Programming OS Internals Assembly Operating Systems GameDev Electronics Security/Hacking SysAdmin Reverse Engineering Algorithms Writing Articles
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx 18. stu
The BabyKernel Windows exploitation challenge from last week's is up on GitHub:
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx 18. stu
Odgovor korisniku/ci @_YouB_
Very much 👍
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx 17. stu
I'm impressed by the detailed analysis of the sample minimization process, root cause and fix of one of the October Windows kernel PE parsing bugs, performed with REVEN. Great read! 🤓
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx proslijedio/la je tweet
Dragon Sector 16. stu
Congratz to DragonCTF 2019 winners! TOP1: p4 () TOP2: PPP () TOP3: ALLES! () GG, WP!
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx 14. stu
Odgovor korisniku/ci @_arkon @Ivanlef0u
Sweet bug, congrats!
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx proslijedio/la je tweet
PagedOut 12. stu
Paged Out! #2 ETA: This Friday.
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx 16. lis
Fantastic research and very useful slides, congrats and thanks for sharing!
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx 11. lis
Odgovor korisniku/ci @_arkon
I haven't checked. I might give it a try later, and you can too as the PoCs are public ;) As Yoav mentioned I specifically tested IDA a while ago and others did too, so hopefully it shouldn't be too prone to crashes anymore :) Not sure about other tools
Reply Retweet Označi sa "sviđa mi se"
j00ru//vx 10. lis
Odgovor korisniku/ci @JusticeRage @ArnaudDlms
The proof of concept files are all attached to the issues in the bug tracker, unless you mean something else?
Reply Retweet Označi sa "sviđa mi se"