| Tweetovi |
| Rick2600 proslijedio/la je tweet | ||
|
Nicolas Krassas
@Dinosn
|
30. sij |
|
Writing a Bootloader medium.com/bugbountywrite…
|
||
|
|
||
| Rick2600 proslijedio/la je tweet | ||
|
Anderson Eduardo
@andersonc0d3
|
25. sij |
|
Memory Management Reference memorymanagement.org
|
||
|
|
||
|
Rick2600
@rick2600
|
24. sij |
|
Congratz man!
|
||
|
|
||
|
Rick2600
@rick2600
|
24. sij |
|
kkkkkk
|
||
|
|
||
|
Rick2600
@rick2600
|
21. sij |
|
|
||
| Rick2600 proslijedio/la je tweet | ||
|
Silvio Cesare
@silviocesare
|
18. sij |
|
My first blog post on browser exploitation for
@infosectcbr. I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied. blog.infosectcbr.com.au/2020/01/firefo…
|
||
|
|
||
| Rick2600 proslijedio/la je tweet | ||
|
Brian Roemmele
@BrianRoemmele
|
5. sij |
|
Consider: millions of years ago our antecedents gave a massive sacrifice of their left hemisphere.
We lost a tremendous amount of short term memory and replaced it with Broca’s, Wernicke & the phonological loop.
But why?
So we can—talk.
Thus chimpanzees can do this—we can’t: pic.twitter.com/CDznxg37p1
|
||
|
|
||
| Rick2600 proslijedio/la je tweet | ||
|
Rewzilla
@Rewzilla
|
4. sij |
|
I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.
blog.jmpesp.org/2020/01/fuzzin…
|
||
|
|
||
|
Rick2600
@rick2600
|
31. pro |
|
Parabéns @eltctfbr, tem representado bem!
|
||
|
|
||
|
Rick2600
@rick2600
|
21. pro |
|
|
||
|
Rick2600
@rick2600
|
16. pro |
|
|
||
| Rick2600 proslijedio/la je tweet | ||
|
Mobile Security
@mobilesecurity_
|
11. pro |
|
What’s Up with WhatsApp - a detailed walk through of Reverse Engineering CVE-2019-3568
#MobileSecurity #AndroidSecurity
#JailbreakSecuritySummit by @maddiestone
SLIDES: github.com/maddiestone/Co…
VIDEO: vimeo.com/377181218 pic.twitter.com/J4M5inCidC
|
||
|
|
||
| Rick2600 proslijedio/la je tweet | ||
|
|
Axel Souchet
@0vercl0k
|
6. pro |
|
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs. github.com/0vercl0k/CVE-2… pic.twitter.com/LeAOCgqpMG
|
||
|
|
||
|
Rick2600
@rick2600
|
30. stu |
|
youtube.com/user/Swarlemag… Some ideias for Binary Ninja.
|
||
|
|
||
| Rick2600 proslijedio/la je tweet | ||
|
PagedOut
@pagedout_zine
|
15. stu |
|
Paged Out! #2
pagedout.institute
Thanks to all the authors and the institute!
Enjoy!
|
||
|
|
||
|
Rick2600
@rick2600
|
14. stu |
|
Top! @thezakman trabalha bem!
|
||
|
|
||
| Rick2600 proslijedio/la je tweet | ||
|
The Intercept Brasil
@TheInterceptBr
|
9. stu |
|
Estamos mexendo com gente perigosa. É hora de proteger o que nós – todos nós – ainda temos de mais valioso nesse país. interc.pt/2pI1ki6 por @demori
|
||
|
|
||
| Rick2600 proslijedio/la je tweet | ||
|
ƒyoorer
@fyoorer
|
1. stu |
|
SAML for pentesters:
Part 1 - epi052.gitlab.io/notes-to-self/…
Part 2 - epi052.gitlab.io/notes-to-self/…
Part 3 -epi052.gitlab.io/notes-to-self/…
Common attacks - blog.netspi.com/attacking-sso-…
Case study - economyofmechanism.com/office365-auth…
#SAML #BugBounty
|
||
|
|
||
| Rick2600 proslijedio/la je tweet | ||
|
Shashank
@cyberboyIndia
|
28. lis |
|
Android Pentesting CheatSheet blog.dixitaditya.com/android-pentes…
|
||
|
|
||
| Rick2600 proslijedio/la je tweet | ||
|
Ori Damari
@0xrepnz
|
26. lis |
|
While reverse engineering a rootkit sample (That I soon will publish about 😉) I saw this weird compiler optimization.
I thought I'll start documenting compiler optimizations for reverse engineers. Read my first article in the series:
repnz.github.io/posts/reversin… pic.twitter.com/RufA3fHDa4
|
||
|
|
||