Twitter | Pretraživanje | |
MicrosVuln
Vulnerability under the 🔬Microscope
151
Tweetovi
438
Pratim
513
Osobe koje vas prate
Tweetovi
MicrosVuln proslijedio/la je tweet
Ghidra Ninja 23 h
Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln proslijedio/la je tweet
Frank Denis 18 h
Yet another vulnerability in sudo
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln 1. velj
DataTracker: A Pin tool for collecting high-fidelity data provenance from unmodified programs.
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln proslijedio/la je tweet
GitHub Security Lab 30. sij
Do you know ? It brings interesting add-ons to AFL. used it during his fuzzing research to create custom instrumentation whitelists, increasing AFL code coverage
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln proslijedio/la je tweet
Andrea Fioraldi 30. sij
Happy to announce a new LLVM instrumentation for AFL++ called CmpLog that feeds the fuzzer with comparisons operands extracted with SanCov. I used it to build the Redqueen mutator in AFL++!
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln 30. sij
PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610 python
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln proslijedio/la je tweet
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 30. sij
🎉 New blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous / package using coverage-guided fuzzer. ➡️ Fuzzer: Jsfuzz by ➡️ Target: wasm-parser ➡️ Bug: DoS/OOM
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln 29. sij
Fuzzing software: common challenges and potential solutions (Part 1)
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln 29. sij
Odgovor korisniku/ci @Rode0day
And where are you guys at rode0day? no challenge anymore? can't wait for more challenges, I've armed myself with new fuzzers for hunting more! :-)
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln 27. sij
Odgovor korisniku/ci @hackerschoice
A few more efficient fuzzers has already been added to list . Check Thanks to van Hauser
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln 22. sij
ApplicationInspector - source code analyzer by Microsoft
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln 10. sij
Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln proslijedio/la je tweet
Richard Johnson 5. sij
Interesting paper qualitatively analyzing reverse engineering process & methods
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln proslijedio/la je tweet
expend 20. pro
Qt Gif parsing null deref rediscovered with
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln proslijedio/la je tweet
didu 19. pro
Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): Hoping to spread the RE fever :)
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln 19. pro
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln 19. pro
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln proslijedio/la je tweet
SandboxEscaper 17. pro
Odgovor korisniku/ci @checkymander
Procmon works very well for me. If I were to write my own tooling, I would write something similar to process monitor, atleast visually, that allows you to hook arbitrary functions (ones that are used for resource access) to find race conditions elsewhere, not just filesystem
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln 16. pro
Odgovor korisniku/ci @richinseattle
Pretty! :-)
Reply Retweet Označi sa "sviđa mi se"
MicrosVuln proslijedio/la je tweet
Kostya Serebryany 13. pro
Running libFuzzer in a browser, via WASM. We need to go deeper (?)
Reply Retweet Označi sa "sviđa mi se"