Twitter | Pretraživanje | |
Roman
iOS/Android Penetration Tester.
22
Tweetovi
112
Pratim
4
Osobe koje vas prate
Tweetovi
Roman proslijedio/la je tweet
Samuel Groß 9. sij
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Samuel Groß 27. pro
Slides + recording of my talk: had to omit many details, but blogpost coming soon!
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Emad Shanab 27. pro
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Andrea Fioraldi 26. pro
New blogpost: Sanitized Emulation with QEMU-AddressSanitizer I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
LiveOverflow 🔴 10. pro
I'm really excited about this video. It has been in the making for a long time. It's a video with about his SockPuppet vulnerability in the XNU (iOS/Mac) Kernel and was used for jailbreaking. Haxember #10
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Maddie Stone 5. pro
🌟v2 of my free Intro to Android App Reverse Engineering workshop is here! 🌟 I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Daniel Baier 7. pro
Here are the slides for the talk by me on DeStroid in automatically deobfuscate encrypted strings in Android malware. Including some bonus slides:)
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
axi0mX 🌧️📲 27. ruj
EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
teambi0s 20. kol
Writeup for VM Escape found by our team member : In the writeup, Vishnu describes how he found and exploited CVE-2019-14378 that was a pointer miscalculation bug in network backend of QEMU to get code execution!
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Ben Hawkes 15. svi
Project Zero's tracking sheet for zero-day exploits that were detected "in the wild":
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Binni Shah 30. tra
Pentesting Cheatsheets - Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs : cc @kondencuotas
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Ivn 1. tra
Announcing my very own free, open source and online course: "Reverse Engineer iOS Applications" 📱 My favourite personal project yet. It was a lot of fun and hard work but I hope it'll help drive more researchers to mobile security. Feedback always welcome
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
LiveOverflow 🔴 31. ožu
I never thought I would experience a XSS on Google Search. But blew my mind! This is a video going over the difficulties of sanitizing HTML in JavaScript.
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
NahamSec 15. ožu
RCE on Steam Client via buffer overflow in Server Info by and vinnievan. Full report here: ($18,000 bounty)
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Dmitry Vyukov 7. ožu
Translating: mmap_min_addr bypass means that hundreds of NULL-derefs in Linux kernel that usually treated as "local DoS in Linux, who cares?" now suddenly become easily exploitable So if you don't have the fix your kernel is subject to 100s of exploits eg:
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Brendan Dolan-Gavitt 21. velj
For your enjoyment, here are 242 Linux kernel crashes from the Syzkaller crash database reproduced and recorded in PANDA (165GB):
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Andrey Konovalov 15. velj
Slides for my "Coverage-guided USB Fuzzing with Syzkaller" talk
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
m0z 10. velj
Here is my obfuscated payload. It bypasses lots of WAF, including CloudFlare iirc. <iframe src="%0Aj%0Aa%0Av%0Aa%0As%0Ac%0Ar%0Ai%0Ap%0At%0A%3Aalert(0)"> iFrame with javascript URI payload. Line feeds [CRLF] obfuscate it.
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Max Moroz 7. velj
ClusterFuzz, an infrastructure used for fuzzing Chrome and OSS-Fuzz, is open source now! Enjoy responsibly :) Blog: Code:
Reply Retweet Označi sa "sviđa mi se"
Roman proslijedio/la je tweet
Luke Stephens (hakluke) 5. velj
Reply Retweet Označi sa "sviđa mi se"