|
Sascha Schirra
@
s4sh_s
Castrop-Rauxel, Germany
|
|
Let there be #root
|
|
|
1.006
Tweetovi
|
318
Pratim
|
985
Osobe koje vas prate
|
| Tweetovi |
| Sascha Schirra proslijedio/la je tweet | ||
|
Stephen Sims
@Steph3nSims
|
19. sij |
|
A great Windows 10 heap grooming and exploitation blog post by @_sinn3r in case you missed it last year: blog.rapid7.com/2019/06/12/hea…
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
joernchen
@joernchen
|
15. sij |
|
Work with me in the awesome @gitlab appsec team:
grnh.se/0722a3022
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
Hetti ʷᵃʳᶦ
@Th3PeKo
|
10. sij |
|
Mein Studium neigt sich dem Ende zu.
Ich suche ab März/April eine IT Security Vollzeitstelle. Entry/intermediate Position.
Penetration Testing/Blue Team/SOC/Security+Sysadmin/Security Foo
Raum Wien || remote
Über Tipps & Angebote bin ich dankbar. DMs open.
RT erwünscht. Danke
|
||
|
|
||
|
Sascha Schirra
@s4sh_s
|
10. sij |
|
Sowas wäre total langweilig ;-)
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
Bailey Basile
@BasileBailey
|
7. sij |
|
We're looking for a manager for my team at Apple. DMs open.
jobs.apple.com/en-us/details/…
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
Blue Frost Security
@bluefrostsec
|
7. sij |
|
Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher @flxflndy labs.bluefrostsecurity.de/blog/2020/01/0…
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
Christian Ammann
@beli4l_
|
7. sij |
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
LiveOverflow 🔴
@LiveOverflow
|
6. sij |
|
Considering to move within Berlin. Looking for 2-3+ rooms. If anybody happens to know a landlord with an apartment coming up the next few months, please think of me.
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
Askar
@mohammadaskar2
|
4. sij |
|
Just wrote an article about how I found a new Remote Command Execution 0-day (CVE-2019-15029) in Pandora FMS v7.0NG monitoring software
I Found it by performing a static code analysis and finally wrote a python exploit for it.
shells.systems/pandorafms-v7-…
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
Azeria
@Fox0x01
|
3. sij |
|
Reverse Engineering Encrypted Code Segments:
medium.com/@ryancor/rever…
by Ryan Cornateanu
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
Samuel Groß
@5aelo
|
27. pro |
|
Slides + recording of my #36c3 talk: saelo.github.io/presentations/… media.ccc.de/v/36c3-10497-m… had to omit many details, but blogpost coming soon!
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
Andrea Fioraldi
@andreafioraldi
|
26. pro |
|
New blogpost: Sanitized Emulation with QEMU-AddressSanitizer
andreafioraldi.github.io/articles/2019/…
I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
joernchen
@joernchen
|
20. pro |
|
The @gitlab red team presents:
Token-Hunter
about.gitlab.com/blog/2019/12/2…
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
kmkz
@kmkz_security
|
13. pro |
|
#protip from battlefield:
Found Slack #API key and do not know what to do?
Start @beefproject instance (or any browser payload) and use #API to invite users to go on your xmas-kdo.lol/companyname link to get free gifts.
Don't forget to spoof user+send message on every chan ;)
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
quarkslab
@quarkslab
|
10. pro |
|
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 1) blog.quarkslab.com/a-deep-dive-in… by @NeatMonster_, @patateQbool and @pandasec_
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
Thomas Roth
@StackSmashing
|
16. ruj |
|
Super excited to finally release SVD-Loader for Ghidra: A tool to make bare-metal ARM firmware reverse-engineering much easier by automatically annotating all peripherals - for over 650 different microcontrollers! leveldown.de/blog/svd-loade… pic.twitter.com/o5ZmtkwGHq
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
Andrea Fioraldi
@andreafioraldi
|
12. pro |
|
Good news! @fridadotre Stalker is now ready for fuzzing and my frida-fuzzer is ready to fuzz APIs of Android apps.
github.com/andreafioraldi…
With a logic inspired by AFL, it has a libFuzzer-like harness interface.
The project is in his early stage, look at the TODOs to contribute.
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
Miasm
@MiasmRe
|
12. pro |
|
You can now install Miasm using "pip install miasm" !
See github.com/cea-sec/miasm/…
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
P4wnP1
@P4wnP1
|
12. pro |
|
Had to take a longer break from P4wnP1 development this year.
Here's a small excuse:
My @bsideskbh talk on exploitation of Logitech wireless input devices ... and yes, it includes air gap bridging once more
vimeo.com/378870549
|
||
|
|
||
| Sascha Schirra proslijedio/la je tweet | ||
|
Markus Vervier
@marver
|
10. pro |
|
Quick recap in English: @x41sec was asked to check the security of a doctors office. We found issues like unauth remote updates of a software managing patient data (the 90s are calling). When reported to the vendor, the first response was denial, then lawyers. twitter.com/golem/status/1…
|
||
|
|
||