Twitter | Pretraživanje | |
Rick2600
just me!
837
Tweetovi
405
Pratim
569
Osobe koje vas prate
Tweetovi
Rick2600 proslijedio/la je tweet
Nicolas Krassas 30. sij
Writing a Bootloader
Reply Retweet Označi sa "sviđa mi se"
Rick2600 proslijedio/la je tweet
Anderson Eduardo 25. sij
Memory Management Reference
Reply Retweet Označi sa "sviđa mi se"
Rick2600 24. sij
Odgovor korisniku/ci @steventseeley @thezdi @mufinnnnnnn
Congratz man!
Reply Retweet Označi sa "sviđa mi se"
Rick2600 24. sij
Odgovor korisniku/ci @CaioLuders
kkkkkk
Reply Retweet Označi sa "sviđa mi se"
Rick2600 21. sij
Odgovor korisniku/ci @pagedout_zine @gynvael
Reply Retweet Označi sa "sviđa mi se"
Rick2600 proslijedio/la je tweet
Silvio Cesare 18. sij
My first blog post on browser exploitation for . I'll look at how to pop xcalc on current Linux Spidermonkey given a relative (oob) rw bug. Spidermonkey is the JavaScript Engine in Firefox. Exploit code also supplied.
Reply Retweet Označi sa "sviđa mi se"
Rick2600 proslijedio/la je tweet
Brian Roemmele 5. sij
Consider: millions of years ago our antecedents gave a massive sacrifice of their left hemisphere. We lost a tremendous amount of short term memory and replaced it with Broca’s, Wernicke & the phonological loop. But why? So we can—talk. Thus chimpanzees can do this—we can’t:
Reply Retweet Označi sa "sviđa mi se"
Rick2600 proslijedio/la je tweet
Rewzilla 4. sij
I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.
Reply Retweet Označi sa "sviđa mi se"
Rick2600 31. pro
Odgovor korisniku/ci @eltctfbr
Parabéns , tem representado bem!
Reply Retweet Označi sa "sviđa mi se"
Rick2600 21. pro
Reply Retweet Označi sa "sviđa mi se"
Rick2600 16. pro
Reply Retweet Označi sa "sviđa mi se"
Rick2600 proslijedio/la je tweet
Mobile Security 11. pro
What’s Up with WhatsApp - a detailed walk through of Reverse Engineering CVE-2019-3568 by SLIDES: VIDEO:
Reply Retweet Označi sa "sviđa mi se"
Rick2600 proslijedio/la je tweet
Axel Souchet 6. pro
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.
Reply Retweet Označi sa "sviđa mi se"
Rick2600 30. stu
Some ideias for Binary Ninja.
Reply Retweet Označi sa "sviđa mi se"
Rick2600 proslijedio/la je tweet
PagedOut 15. stu
Paged Out! #2 Thanks to all the authors and the institute! Enjoy!
Reply Retweet Označi sa "sviđa mi se"
Rick2600 14. stu
Odgovor korisniku/ci @mateeuslinno @thezakman
Top! trabalha bem!
Reply Retweet Označi sa "sviđa mi se"
Rick2600 proslijedio/la je tweet
The Intercept Brasil 9. stu
Estamos mexendo com gente perigosa. É hora de proteger o que nós – todos nós – ainda temos de mais valioso nesse país. por
Reply Retweet Označi sa "sviđa mi se"
Rick2600 proslijedio/la je tweet
ƒyoorer 1. stu
Reply Retweet Označi sa "sviđa mi se"
Rick2600 proslijedio/la je tweet
Shashank 28. lis
Android Pentesting CheatSheet
Reply Retweet Označi sa "sviđa mi se"
Rick2600 proslijedio/la je tweet
Ori Damari 26. lis
While reverse engineering a rootkit sample (That I soon will publish about 😉) I saw this weird compiler optimization. I thought I'll start documenting compiler optimizations for reverse engineers. Read my first article in the series:
Reply Retweet Označi sa "sviđa mi se"