Twitter | Pretraživanje | |
Peleg Hadar
Security Researcher at . I have a passion for various InfoSec topics such as Offensive Security, Windows Internals, RE, Low-Level and Vuln Research
174
Tweetovi
827
Pratim
471
Osobe koje vas prate
Tweetovi
Peleg Hadar 9 h
Correct. VS2017 is no longer loads the DLL as an executable, it treats it as a data-only file.
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar 22 h
CVE-2019-19705 - A vulnerability which I found in Realtek's Driver package for Windows, which affects a lot of PC users:
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar proslijedio/la je tweet
Jon Oberheide 4. velj
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar 3. velj
I interviewed for TechRadar Pro about the vulnerabilities I found during 2019 as part of my job in Labs.
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar 1. velj
If you want to start a research on one of Apple's mechanisms which are related to the Continuity protocol - this repo looks like a great reference to start with.
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar 1. velj
Odgovor korisniku/ci @ynvb @ronenshh
AWESOME JOB 👑
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar 31. sij
Odgovor korisniku/ci @CStar_OW
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar proslijedio/la je tweet
PJC 29. sij
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar 21. sij
A great novel research by Amit Klein - Labs:
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar proslijedio/la je tweet
BlueHat IL 20. sij
The wait is finally over! Registration & schedule for 2020 are live. Places are limited so register NOW:
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar proslijedio/la je tweet
SafeBreach 17. sij
SafeBreach Labs is the 1st BAS solutions to deliver simulations for endpoint and network coverage.
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar proslijedio/la je tweet
🥝 Benjamin Delpy 17. sij
last use case for today Yes, it's also dangerous for Microsoft VBA macro (especially when you think "Disable all Macros except digitally signed" will protect you)
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar proslijedio/la je tweet
Tal Be'ery 17. sij
1/ Insights from analyzing Chrome's patch for to protect Chrome's users on vulnerable unpatched machines
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar 17. sij
"The ECC discrete log parameter P-256... [SNIP] ... is suspected of having an NSA backdoor in its unexplained constants" -2020-0601
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar 16. sij
If you own a Windows 10 box - don’t wait, update it now.
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar proslijedio/la je tweet
Yarden Shafir 16. sij
After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar 15. sij
Odgovor korisniku/ci @matalaz
This is the patched one (10.0.18362.592): 7a9dd389b0e3c124d4bfe5c1ff15f9a93285514f
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar proslijedio/la je tweet
i24NEWS English 14. sij
The United States says plans to launch multiple cyber attacks in retaliation for the killing of Qasem . Israeli company, , tells i24NEWS' Ariel Levin-Waldman how one can identity, and combat Iranian 'threat groups' :
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar proslijedio/la je tweet
Ralf (RPW) 14. sij
OK, this explains the call to ChainComparePublicKeyParametersAndBytes() in ChainGetSubjectStatus():
Reply Retweet Označi sa "sviđa mi se"
Peleg Hadar proslijedio/la je tweet
Blue Frost Security 7. sij
Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher
Reply Retweet Označi sa "sviđa mi se"