Twitter | Pretraživanje | |
kost
Security/Hack. FLOSS security software contributor.
9.013
Tweetovi
2.654
Pratim
1.499
Osobe koje vas prate
Tweetovi
kost proslijedio/la je tweet
Xentropy 1. velj
I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
Vern McCandlish 2. velj
This is an excellent example of finding what is being measured and figuring out how to impact those variables to produce a desired outcome. Hacking 101
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
☣ KitPloit - Hacker Tools 2. velj
PCFG Cracker - Probabilistic Context Free Grammar (PCFG) Password Guess Generator
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
Steve Crowley 2. velj
Performance artist generates virtual traffic jams in Google Maps by pulling a wagon full of smartphones
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
/r/netsec 2. velj
Say hello to OpenSK: a fully open-source security key implementation
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
raptor 2. velj
I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by You can find it here:
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
/r/netsec 2. velj
Buffer overflow in sudo versions 1.7.1 - 1.8.25p1 when pwfeedback is set in sudoers
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
Florian Hansemann 2. velj
Be careful what you copy: Invisibly inserting usernames into text with Zero-Width Characters
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
Nicolas Krassas 2. velj
GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
DirectoryRanger 1. velj
Windows 10 UAC bypass for all executable files which are autoelevate true.
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
Nicolas Krassas 1. velj
Java jdbc (deserialization) vulnerability automated exploitation
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
ZDNet 1. velj
Burn, drown, or smash your phone: Forensics can extract data anyway
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
Cure53 1. velj
Monday we will release DOMPurify 2.0.8 to fix a problem with SAFE_FOR_JQUERY and jQuery 3.x. If you don't use the SAFE_FOR_JQUERY combined with jQuery 3.x all is fine. If you do, please upgrade. 🙇‍♀️
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
hashcat 1. velj
For those of you using a NV GPU with Volta or Turing chipset, listen up! We hacked our way into the post-48k GPU shared memory region. This improved bcrypt cracking performance by an average of 25%. For instance a GTX2080Ti improved from 42116 H/s to 54770 H/s
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
Radiona_org - https://www.crowdsupply.com/radiona 31. sij
New trick from EMARD loading overlay
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
Florian Roth 1. velj
If you need a name for a new malware, threat group operation or hack tool, check this Imgur gallery with 29 posters showing deities, monsters and heroes of different mythologies
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
ʇıqqɐᴚ 1. velj
I’ve been signing credit card slips with MASH characters names for years and no one has ever said anything about it
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
DC3 VDP 31. sij
Happy Friday hackers! Nitesh found a critical RCE vulnerability in Jenkins that led us to discover a Bitcoin mining service running on a DoD website 😲. Head over to the disclosed report to see all the details! Thanks for being 🔥 Nitesh
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
/r/netsec 1. velj
Kraken Identifies Critical Flaw in Trezor Hardware Wallets
Reply Retweet Označi sa "sviđa mi se"
kost proslijedio/la je tweet
Nicolas Krassas 31. sij
TrickBot Uses a New Windows 10 UAC Bypass to Launch Quietly
Reply Retweet Označi sa "sviđa mi se"