|
Roman
@
romanwagnr
Deutschland
|
|
iOS/Android Penetration Tester.
|
|
|
22
Tweetovi
|
112
Pratim
|
4
Osobe koje vas prate
|
| Tweetovi |
| Roman proslijedio/la je tweet | ||
|
Samuel Groß
@5aelo
|
9. sij |
|
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage: googleprojectzero.blogspot.com/2020/01/remote…
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Samuel Groß
@5aelo
|
27. pro |
|
Slides + recording of my #36c3 talk: saelo.github.io/presentations/… media.ccc.de/v/36c3-10497-m… had to omit many details, but blogpost coming soon!
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Emad Shanab
@Alra3ees
|
27. pro |
|
Mobile Application Pentesting :
Part 1:-
medium.com/@patilpiyush/m…
Part 2:-
medium.com/@patilpiyush/m…
Part 3:-
medium.com/@patilpiyush/m…
Part 4:-
medium.com/@patilpiyush/m…
Part 5:-
medium.com/@patilpiyush/m…
Part 6:-
medium.com/@patilpiyush/m…
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Andrea Fioraldi
@andreafioraldi
|
26. pro |
|
New blogpost: Sanitized Emulation with QEMU-AddressSanitizer
andreafioraldi.github.io/articles/2019/…
I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
LiveOverflow 🔴
@LiveOverflow
|
10. pro |
|
I'm really excited about this video. It has been in the making for a long time. It's a video with @NedWilliamson about his SockPuppet vulnerability in the XNU (iOS/Mac) Kernel and was used for jailbreaking.
Haxember #10
youtube.com/watch?v=YV3jew… pic.twitter.com/c2jbwDUVrx
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Maddie Stone
@maddiestone
|
5. pro |
|
🌟v2 of my free Intro to Android App Reverse Engineering workshop is here! 🌟
I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!
maddiestone.github.io/AndroidAppRE pic.twitter.com/0iPNoJ3p7y
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Daniel Baier
@danielbaier
|
7. pro |
|
Here are the slides for the #botconf2019 talk by me on DeStroid in automatically deobfuscate encrypted strings in Android malware. Including some bonus slides:)
github.com/fkie-cad/DeStr…
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
axi0mX 🌧️📲
@axi0mX
|
27. ruj |
|
EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices.
Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).
github.com/axi0mX/ipwndfu
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
teambi0s
@teambi0s
|
20. kol |
|
Writeup for #QEMU VM Escape found by our team member @vishnudevtj : blog.bi0s.in/2019/08/20/Pwn…
In the writeup, Vishnu describes how he found and exploited CVE-2019-14378 that was a pointer miscalculation bug in network backend of QEMU to get code execution!
#Exploitation pic.twitter.com/TzvSWZ9W67
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Ben Hawkes
@benhawkes
|
15. svi |
|
Project Zero's tracking sheet for zero-day exploits that were detected "in the wild": googleprojectzero.blogspot.com/p/0day.html
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Binni Shah
@binitamshah
|
30. tra |
|
Pentesting Cheatsheets - Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs : ired.team/offensive-secu… cc @kondencuotas
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Ivn
@ivRodriguezCA
|
1. tra |
|
Announcing my very own free, open source and online course: "Reverse Engineer iOS Applications" 📱
My favourite personal project yet. It was a lot of fun and hard work but I hope it'll help drive more researchers to mobile security. Feedback always welcome ivrodriguez.com/announcing-my-…
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
LiveOverflow 🔴
@LiveOverflow
|
31. ožu |
|
I never thought I would experience a XSS on Google Search. But @kinugawamasato blew my mind!
This is a video going over the difficulties of sanitizing HTML in JavaScript.
youtube.com/watch?v=lG7U3f… pic.twitter.com/EwoM0GaW3o
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
NahamSec
@NahamSec
|
15. ožu |
|
RCE on Steam Client via buffer overflow in Server Info by @0xACB and vinnievan. Full report here: hackerone.com/reports/470520 ($18,000 bounty) pic.twitter.com/b0Zpbw6yfL
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Dmitry Vyukov
@dvyukov
|
7. ožu |
|
Translating: mmap_min_addr bypass means that hundreds of NULL-derefs in Linux kernel that usually treated as "local DoS in Linux, who cares?" now suddenly become easily exploitable
So if you don't have the fix your kernel is subject to 100s of exploits eg:
syzkaller.appspot.com/#upstream-open twitter.com/a13xp0p0v/stat…
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Brendan Dolan-Gavitt
@moyix
|
21. velj |
|
For your enjoyment, here are 242 Linux kernel crashes from the Syzkaller crash database reproduced and recorded in PANDA (165GB): pompeii.mit.edu/~moyix/syzkall…
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Andrey Konovalov
@andreyknvl
|
15. velj |
|
Slides for my "Coverage-guided USB Fuzzing with Syzkaller" talk @offensive_con docs.google.com/presentation/d…
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
m0z
@LooseSecurity
|
10. velj |
|
#BugBounty #bugbountytip #BugBountyTips #infosec #XSS
Here is my obfuscated payload. It bypasses lots of WAF, including CloudFlare iirc.
<iframe src="%0Aj%0Aa%0Av%0Aa%0As%0Ac%0Ar%0Ai%0Ap%0At%0A%3Aalert(0)">
iFrame with javascript URI payload. Line feeds [CRLF] obfuscate it.
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Max Moroz
@Dor3s
|
7. velj |
|
ClusterFuzz, an infrastructure used for fuzzing Chrome and OSS-Fuzz, is open source now! Enjoy responsibly :)
Blog: opensource.googleblog.com/2019/02/open-s…
Code: github.com/google/cluster…
#fuzzing #chrome #oss #security #clusterfuzz
|
||
|
|
||
| Roman proslijedio/la je tweet | ||
|
Luke Stephens (hakluke)
@hakluke
|
5. velj |
|
Search engines for hackers:
censys.io
shodan.io
viz.greynoise.io/table
zoomeye.org
fofa.so
onyphe.io
app.binaryedge.io
hunter.io
wigle.net
|
||
|
|
||