| Tweetovi |
| smd proslijedio/la je tweet | ||
|
Arthur Wongtschowski
@artwongt
|
9. sij |
|
My team is once more hiring vulnerability researchers for our Redmond WA office. This is for low-level OS/platform security research work on Windows and Azure. More details on what we do at linkedin.com/pulse/vulnerab…. Apply directly at aka.ms/AA6z0a8 or DM me if interested!
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
|
Axel Souchet
@0vercl0k
|
3. sij |
|
Here is an exploit for LPE CVE-2019-1184 in case anybody else is interested in this cool bug: github.com/0vercl0k/stuff… pic.twitter.com/Osr4Rk2V8z
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
hackerswhoblaze
@HackersWhoBlaze
|
2. sij |
|
Do you still plan on writing your exploit scripts in elisp^Wpython2?
Be ready in a few months to plug in, dial that modem, heap spray some cats, pop some BGP boxes and ~ b l a z e ~ like there's no tomorrow.
Rolling big blunts @ 4/20/2020, hacking like it's 4/20/1999. pic.twitter.com/qusRegYzhQ
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
|
Axel Souchet
@0vercl0k
|
6. pro |
|
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs. github.com/0vercl0k/CVE-2… pic.twitter.com/LeAOCgqpMG
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
Microsoft Security Intelligence
@MsftSecIntel
|
25. stu |
|
Read about the implementation of pseudo-random number generation (#PRNG) on Windows 10: msft.social/ZC1vTg
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
lander
@landaire
|
28. ruj 2014. |
|
I’m not tryna go to Microsoft
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
matt rat
@__mcgov__
|
23. lis |
|
GET EXCITED: MSVC + AddressSanitizer exists now!
devblogs.microsoft.com/cppblog/addres…
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
Bruce Sherwin
@Bruc3rVis0r
|
19. ruj |
|
If you're a hypervisor or kernel developer, don't miss this opportunity to join the Microsoft Hypervisor Engineering team!
careers.microsoft.com/us/en/job/7076…
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
Alex Matrosov
@matrosov
|
18. kol |
|
I wrote a blog post "Breaking Through Another Side: Bypassing Firmware Security Boundaries". It's a first part of the series based on our #BHUSA research with Alexandre Gazet.
HW/FW Security != Summary of all Security Boundaries
medium.com/@matrosov/firm…
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
Joseph Bialek
@JosephBialek
|
14. kol |
|
My #BlackHat2019 slides on exploiting Hyper-V are now on the MSRC Github page: github.com/microsoft/MSRC…
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
Gynvael Coldwind
@gynvael
|
10. kol |
|
Paged Out! #1 is out! (and it's free to download!)
pagedout.institute/?page=issues.p…
There are 57 articles in 12 categories:
Electronics
Programming
Assembly
Reverse Engineering
Sec/Hack
Retro
File Formats
Algorithmics
SysAdmin
Radio
Phreaking
OS Internals
Enjoy! #PagedOut!
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
Dana Baril
@dana_baril
|
8. kol |
|
The slides and the white paper of our @BlackHatEvents talk are now available online! @EyalItkin #BHUSA2019 blackhat.com/us-19/briefing… pic.twitter.com/a2ksTcywm6
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
Justin Campbell
@metr0
|
23. srp |
|
I'm searching for an engineering leader to help shape how Microsoft mitigates security issues and eliminates vulnerabilities. You'll lead a small but growing team, work with groups across the company, and solve tough engineering problems. aka.ms/AA3qtso (1/2)
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
Vishal Chauhan
@axsdnied
|
3. lip |
|
For anyone looking for slides of my Identity talk @ystscon, it is shared @ github.com/microsoft/MSRC…
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
Bruce Sherwin
@Bruc3rVis0r
|
14. svi |
|
Read about how my team updated our side channel vulnerability mitigation architecture, HyperClear.
techcommunity.microsoft.com/t5/Virtualizat…
#ZombieLoad #HyperV #Intel #Azure
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
|
Axel Souchet
@0vercl0k
|
6. svi |
|
I wrote an exploit for CVE-2019-9810 to play with BigInts; you can find the sources here: github.com/0vercl0k/CVE-2… 🍻 pic.twitter.com/I5SX2NiAXv
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
jsc
@jsc29a
|
3. svi |
|
I spent some time implementing a toolchain and emulator for a machine with only one possible state. Here's a write-up about spelunking in the turing tarpit: calabi-yau.space/blog/tag_intro…
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
offensivecon
@offensive_con
|
10. tra |
|
|
||
|
|
||
| smd proslijedio/la je tweet | ||
|
Insomni'hack
@1ns0mn1h4ck
|
10. tra |
|
Growing Hypervisor 0day with Hyperseed by Shawn Denbow (@sdenbow_), Microsoft
youtu.be/I7xl7DcKbEg
|
||
|
|
||