Twitter | Pretraživanje | |
smd
RIPSEC
694
Tweetovi
1.013
Pratim
531
Osobe koje vas prate
Tweetovi
smd proslijedio/la je tweet
Arthur Wongtschowski 9. sij
My team is once more hiring vulnerability researchers for our Redmond WA office. This is for low-level OS/platform security research work on Windows and Azure. More details on what we do at . Apply directly at or DM me if interested!
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Axel Souchet 3. sij
Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug:
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
hackerswhoblaze 2. sij
Do you still plan on writing your exploit scripts in elisp^Wpython2? Be ready in a few months to plug in, dial that modem, heap spray some cats, pop some BGP boxes and ~ b l a z e ~ like there's no tomorrow. Rolling big blunts @ 4/20/2020, hacking like it's 4/20/1999.
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Axel Souchet 6. pro
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Microsoft Security Intelligence 25. stu
Read about the implementation of pseudo-random number generation () on Windows 10:
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
lander 28. ruj 2014.
I’m not tryna go to Microsoft
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
matt rat 23. lis
GET EXCITED: MSVC + AddressSanitizer exists now!
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Bruce Sherwin 19. ruj
If you're a hypervisor or kernel developer, don't miss this opportunity to join the Microsoft Hypervisor Engineering team!
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Alex Matrosov 18. kol
I wrote a blog post "Breaking Through Another Side: Bypassing Firmware Security Boundaries". It's a first part of the series based on our research with Alexandre Gazet. HW/FW Security != Summary of all Security Boundaries
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Joseph Bialek 14. kol
My slides on exploiting Hyper-V are now on the MSRC Github page:
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Gynvael Coldwind 10. kol
Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! !
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Dana Baril 8. kol
The slides and the white paper of our talk are now available online!
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Justin Campbell 23. srp
I'm searching for an engineering leader to help shape how Microsoft mitigates security issues and eliminates vulnerabilities. You'll lead a small but growing team, work with groups across the company, and solve tough engineering problems. (1/2)
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Vishal Chauhan 3. lip
For anyone looking for slides of my Identity talk , it is shared @
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Bruce Sherwin 14. svi
Read about how my team updated our side channel vulnerability mitigation architecture, HyperClear.
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Axel Souchet 6. svi
I wrote an exploit for CVE-2019-9810 to play with BigInts; you can find the sources here: 🍻
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
jsc 3. svi
I spent some time implementing a toolchain and emulator for a machine with only one possible state. Here's a write-up about spelunking in the turing tarpit:
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
offensivecon 10. tra
Growing Hypervisor 0day with Hyperseed by and
Reply Retweet Označi sa "sviđa mi se"
smd proslijedio/la je tweet
Insomni'hack 10. tra
Growing Hypervisor 0day with Hyperseed by Shawn Denbow (), Microsoft
Reply Retweet Označi sa "sviđa mi se"