Twitter | Pretraživanje | |
RET2 Systems
We strive to reimagine vulnerability research, program analysis, and security education as it exists today.
57
Tweetovi
0
Pratim
4.315
Osobe koje vas prate
Tweetovi
RET2 Systems proslijedio/la je tweet
BlueHat IL 5 h
Sometimes escaping the sandbox is an overkill, demonstrates how user data can be compromised using code execution within the browser sandbox
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
Alexei Bulazel 2. velj
Looking forward to using this Yeti thermos. Awesome prize for completing their RE/exploitation challenge at
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems 1. velj
There are 20 bottles left at our 2020 booth heist! Finish up your exploit soon, because we are on track to run out of bottles by the end of the day.
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
Typhoon Con 22. sij
🌪Announcement🌪 We're excited to announce that Amy Burnett () of RET2 Systems is one of our upcoming speakers at !
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
itszn 20. sij
Been waiting to announce: I'll be presenting "Forget the Sandbox Escape: Abusing Browsers from Code Execution" at this year's BluehatIL This talk will look at what attacks you can pull off in browsers without needing a sandbox escape I will also be demoing a POC of persistence
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems 13. sij
We're sponsoring again this year, and we'll be giving away RET2 laser etched bottles to the first 50 hackers who solve our binary exploitation challenge at the conference!
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
johnny nipper 6. pro
Just registered for this course. Really looking forward to it. 🙃💻
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
itszn 5. pro
Excited to announce that I will also be running my advanced browser exploitation training at Ringzer0 next year!
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
offensivecon 11. stu
This year we will be giving away 8 free tickets to different offensivecon trainings for alumni of . Big shout to all the trainers that have donated a few spots in their classes!
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
Alexei Bulazel 9. stu
I had an incredible week at 's Browser Exploitation training taught by and co. The best and most advanced training course I've ever taken, I'd recommend it to any offensive researchers. Yesterday we took a Chrome V8 JIT n-day from PoC to RCE, awesome.
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems 7. lis
Amy will teach you the techniques to master JavaScript and Just-In-Time Compiler internals and vulnerabilities at her 2020 Browser Exploitation Training! Only a few seats left!
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
Ruben F 19. ruj
Thank you for that wonderful RE and BINEXP course. You really built my knowledge and confidence.
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
itszn 6. ruj
Also super excited to announce that I'll be leading my advanced browser training at OffensiveCon 2020! I had a lot of people asking for me to bring it to Europe so here's your chance!
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
offensivecon 6. ruj
Start your engines! browser exploitation training at OffensiveCon.
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
Luke Champine 28. kol
Just to be clear, your coins are safe -- this has been fixed for ~1 year. :) Thanks for the disclosure and writeup, RET2!
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems 28. kol
We abused a well-defined web standard to exploit a popular cryptocurrency daemon through your browser. Who is up for a little digital heist? ¯\_(ツ)_/¯
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
Cory Duplantis 26. kol
Updated 's code coverage tool for TTD to output drcov format for Lighthouse.
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems 15. kol
Our November training on ubiquitous browser exploitation has 14/20 seats filled. Early bird pricing will be ending tomorrow, August 16th. Join us for a week, and we'll teach you how to make every click risky:
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
itszn 23. srp
If you want to learn how to pwn browsers like this: we just announced a second advanced browser exploitation training that I will be leading this fall Come learn a crazy amount about JavaScript internals and exploitation techniques!
Reply Retweet Označi sa "sviđa mi se"
RET2 Systems proslijedio/la je tweet
🥝🐶 23. srp
This group does great work, if you are willing and can attend, you should.
Reply Retweet Označi sa "sviđa mi se"