Twitter | Pretraživanje | |
Laughing Bit
Born to code, live to hack. Fond of InfoSec, low level software and mirabelles. Author of , member of . Tweets are my tweets.
423
Tweetovi
204
Pratim
717
Osobe koje vas prate
Tweetovi
Laughing Bit proslijedio/la je tweet
Siguza 7. sij
New blog post. ARM hardware bug. In the specification.
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Bill Gates 9. pro
I'm a big fan of and was excited when they asked me to appear in the series finale tonight.
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit 30. stu
Odgovor korisniku/ci @ilfak
Some headers seem missing in the rendering of z80dbg.cpp content.
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Maddie Stone 21. stu
Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Mobile Security 20. stu
KNOX Kernel Mitigation Bypasses - New Reliable Android Kernel Root Exploitation Part #2 [SLIDES]
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Michal Stanek @ 36c3 19. stu
Watch out for typos in your switch/case blocks, this actually compiles (lol). In this case it lets you overflow a kernel buffer with arbitrary data. From Dragon CTF 2019.
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
F-Secure Labs 1. stu
Want to win Pwn2Own without all the hassle of having to spend time finding bugs? We finally got round to sorting out and releasing Jandroid - a tool for helping to find logic bugs in Android apps (and just in time for next week!)
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Specter 9. stu
I've published a write-up on the Android Binder use-after-free kernel bug that p0 discovered recently affected the Pixel 2 and Galaxy S7/S8/S9. It goes into technical details of how an arbitrary read/write is established :)
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Ori Damari 26. lis
While reverse engineering a rootkit sample (That I soon will publish about 😉) I saw this weird compiler optimization. I thought I'll start documenting compiler optimizations for reverse engineers. Read my first article in the series:
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
dukeBarman 24. lis
Our team represented by published technical analysis of the checkm8 exploit
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Steve Miller 17. lis
Please to announce Definitive Dossier of Devilish Debug Details – Part Deux of our PDB path research, where covers his journey into statistical analysis and approaches for general classification of PDB paths with respect to malware.
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Grant Hernandez 15. lis
The writeup and release is here! Tailoring CVE-2015-2215 to Achieve Root -
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
ExaTrack 14. lis
From tweet to rootkit, our analysis by of a signed rootkit highlighted by : [EN] [FR]
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Kostya Kortchinsky 2. lis
How a double-free bug in WhatsApp turns to RCE --
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Gamepopper 4. lis
(a>>1)+(b>>1)+(a&b&1) This operation, that works out the average of two ints in a single instruction, was patented by Samsung. That patent expires today.
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Tetrane 17. ruj
REVEN 2.2 is out! Python API, Automatic Recording, RE Automation and more... Details on
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Jens Gustedt 18. ruj
The second edition of Modern C is now available
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
RPISEC 5. ruj
TokyoWesterns CTF 2019- gnote writeup by pernicious
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Ian Beer 30. kol
thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.
Reply Retweet Označi sa "sviđa mi se"
Laughing Bit proslijedio/la je tweet
Gynvael Coldwind 10. kol
Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !
Reply Retweet Označi sa "sviđa mi se"