Twitter | Pretraživanje | |
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ
Independent Security Researcher // Freelancer // & Security Trainer // I'm doing Reversing, Vulnerability Research & Fuzzing.
4.794
Tweetovi
1.073
Pratim
788
Osobe koje vas prate
Tweetovi
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ proslijedio/la je tweet
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 24 h
Want to reverse module? Analyze cryptominer? WebAssembly VMs? ➡️ Reversing & Fuzzing ⏲️ 3-Days 🇳🇱Amsterdam at 🗓️ 20 -22 April 2020 ⬇️ Detailed outline ⬇️
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 19 h
Second time I will give my training at . I got amazing attendees last year so I'm really looking forward for this year !!!
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 24 h
Want to reverse module? Analyze cryptominer? WebAssembly VMs? ➡️ Reversing & Fuzzing ⏲️ 3-Days 🇳🇱Amsterdam at 🗓️ 20 -22 April 2020 ⬇️ Detailed outline ⬇️
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ proslijedio/la je tweet
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 30. sij
🎉 New blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous / package using coverage-guided fuzzer. ➡️ Fuzzer: Jsfuzz by ➡️ Target: wasm-parser ➡️ Bug: DoS/OOM
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ proslijedio/la je tweet
ringzerø.training 30. sij
has 151 trainings. We have 18. 18 of the best hacker trainings you can ever find. Early 🐦 prices are still available at ! Register now ➡️ RTs appreciated!
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 30. sij
🎉 New blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous / package using coverage-guided fuzzer. ➡️ Fuzzer: Jsfuzz by ➡️ Target: wasm-parser ➡️ Bug: DoS/OOM
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ proslijedio/la je tweet
Nicolas Krassas 9. sij
Fuzzing JavaScript WebAssembly APIs using Dharma/Domato (on Chrome/V8)
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ proslijedio/la je tweet
WebAssemblyWeekly 9. sij
Fuzzing JavaScript WebAssembly APIs using Dharma/Domato - an interesting post that looks at testing the wasm JS APIs for bugs and vulnerabilities
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ proslijedio/la je tweet
/r/netsec 9. sij
Fuzzing JavaScript WebAssembly APIs with Dharma/Domato (Chrome/v8)
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ proslijedio/la je tweet
Alexander Chopan 16. kol
Analysis of Google Keep WebAssembly module | WebAssembly Security (“There aren’t that many people using WebAssembly in production yet, although one notable usage is within GoogleKeep, a cross-platform note-taking app”)
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 29. sij
Odgovor korisniku/ci @gamozolabs
Will be available on YouTube as well? ;)
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ proslijedio/la je tweet
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 28. sij
🐦 Only 4 days left to enjoy the early bird discount 🔥 ➡️ Reversing & Fuzzing ⏲️ 3-Days 🇳🇱 Amsterdam at 🗓️ 20 -22 April 2020
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 28. sij
🐦 Only 4 days left to enjoy the early bird discount 🔥 ➡️ Reversing & Fuzzing ⏲️ 3-Days 🇳🇱 Amsterdam at 🗓️ 20 -22 April 2020
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 27. sij
I will give a workshop about how to reverse eWasm smart contract ;)
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ proslijedio/la je tweet
Jonathan Foote 23. sij
Looks like we're in the final throws of getting wasmtime accepted into oss-fuzz, which would be the first fuzz targets running there ever AFAIK. Thanks to @jonathanmetzman (and team) for helping make this happen. Pretty cool.
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ proslijedio/la je tweet
Jacques Favreau 22. sij
Holy smokes! comes flying into the ring with Puppeteer-on-12-cups-of-coffee — Playwright does native browser automation on Chromium, WebKit, and Firefox. 🤯🤯
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 23. sij
Is ChakraCore still used by ? Because it's pretty funny to see the number of github issues with *potential 0-days* crashtests insides.
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ 21. sij
Which subject about security do you want for my next blogpost? Old blogposts here: Training:
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ proslijedio/la je tweet
Maurício Aniche 20. sij
We () just opened our software testing lecture notes. It currently contains 14 full chapters, 52k words, 63 videos, and 82 exercises. License: CC-BY-NC-SA. Feel free to use it!
Reply Retweet Označi sa "sviđa mi se"
ᴘᴀᴛʀɪᴄᴋ ᴠᴇɴᴛᴜᴢᴇʟᴏ proslijedio/la je tweet
Silvio Cesare 18. sij
My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.
Reply Retweet Označi sa "sviđa mi se"