Twitter | Pretraživanje | |
Proteas
Security Researcher at Qihoo 360 Nirvan Team
1.093
Tweetovi
263
Pratim
3.907
Osobe koje vas prate
Tweetovi
Proteas 19. sij
Odgovor korisniku/ci @revskills
:)
Reply Retweet Označi sa "sviđa mi se"
Proteas 19. sij
d00139ed4f1422410fad056e83f05b418046d5b8dde5806410c0e2385d89a8e6 :)
Reply Retweet Označi sa "sviđa mi se"
Proteas 14. sij
FWD: The AArch64 backend gained definitions for missing Apple CPU names.
Reply Retweet Označi sa "sviđa mi se"
Proteas 22. pro
不管是否愿意,每一代人都有自己的历史使命或者历史局限性。
Reply Retweet Označi sa "sviđa mi se"
Proteas 19. pro
seems that Gigalocker is kind of filesystem integrity protection mechanism.
Reply Retweet Označi sa "sviđa mi se"
Proteas 17. pro
Odgovor korisniku/ci @revskills @CodeColorist
updated :)
Reply Retweet Označi sa "sviđa mi se"
Proteas 10. pro
how to disable arm macro instruction? Options>General…>Analysis>Kernel option3>Enable macro, uncheck it.
Reply Retweet Označi sa "sviđa mi se"
Proteas proslijedio/la je tweet
qwertyoruiop 8. stu
Reply Retweet Označi sa "sviđa mi se"
Proteas 30. lis
Binary Format of iOS 13 Sandbox Profile Collection:
Reply Retweet Označi sa "sviđa mi se"
Proteas 29. lis
Reported some iOS kernel bugs to product-security[AT]apple[DOT]com 2 hours ago, but didn’t received any auto-reply. so where are my bugs...
Reply Retweet Označi sa "sviđa mi se"
Proteas proslijedio/la je tweet
Brandon Azad 28. lis
Odgovor korisniku/ci @_bazad
KTRW was motivated by the desire to see better and more open tooling for security research on iPhones. Read about the journey to find the KTRR bypass:
Reply Retweet Označi sa "sviđa mi se"
Proteas 23. lis
Reply Retweet Označi sa "sviđa mi se"
Proteas 29. ruj
希望苹果的安全人员能明白:并不是说把内裤穿到外面,你们就是安全领域的超人。你们应该对社区保持尊重,并依赖社区的力量把安全做好。
Reply Retweet Označi sa "sviđa mi se"
Proteas proslijedio/la je tweet
axi0mX 🌧️📲 27. ruj
EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).
Reply Retweet Označi sa "sviđa mi se"
Proteas 26. ruj
iOS 13.1, maild is in sandbox now. maybe something happened.
Reply Retweet Označi sa "sviđa mi se"
Proteas 12. ruj
14G60, AppleSEPOS-438.60.1 17A5837a, AppleSEPOS-1267.0.12
Reply Retweet Označi sa "sviđa mi se"
Proteas 11. ruj
17A577, .WebKit.WebContent: (allow syscall-unix (syscall-mask 531)).
Reply Retweet Označi sa "sviđa mi se"
Proteas 3. ruj
Reply Retweet Označi sa "sviđa mi se"
Proteas proslijedio/la je tweet
Ian Beer 30. kol
thanks to , for their joint work on this. This has been a huge effort to pull apart and document almost every byte of a multi-year in-the-wild exploitation campaign, which used 14 different iOS exploits.
Reply Retweet Označi sa "sviđa mi se"
Proteas 29. kol
Coverage Guided Code Auditing on XNU, xnu auditing method/trick.
Reply Retweet Označi sa "sviđa mi se"