Twitter | Pretraživanje | |
Semmle
A code analysis platform for finding zero-days and automating variant analysis | Creators of QL and
410
Tweetovi
21
Pratim
1.811
Osobe koje vas prate
Tweetovi
Semmle proslijedio/la je tweet
GitHub Security Lab 2. pro
ICYMI: We're running a CTF until December 31st. Write a CodeQL query to find a specific class of DOM-based XSS vulns. The 2 best submissions will win Nintendo Switches, and 10 additional entries will receive coupons that can be used for GitHub Swag.
Reply Retweet Označi sa "sviđa mi se"
Semmle proslijedio/la je tweet
GitHub Security Lab 25. stu
We've just launched a new slack workspace for anyone interested in being part of the mission to secure the open source software we all depend on. If you'd like to receive an invitation to join the workspace, send us a DM with your email address.
Reply Retweet Označi sa "sviđa mi se"
Semmle proslijedio/la je tweet
GitHub Security Lab 17. stu
Yesterday we had our first GitHub Security Meetup, with ligthning talks by and Abishek Arya (Google). But also with exciting discussions with security folks. Thanks to all attendees and others: stay tuned for the next one in January.
Reply Retweet Označi sa "sviđa mi se"
Semmle proslijedio/la je tweet
GitHub Security Lab 15. stu
Learn how our security researcher found wireless vulnerabilities in the Linux Kernel, and variants, thanks to CodeQL:
Reply Retweet Označi sa "sviđa mi se"
Semmle proslijedio/la je tweet
GitHub Security Lab 15. stu
Want to challenge your vulnerability hunting skills? Try our latest Capture The Flag and discover XSS-unsafe jQuery plugins:
Reply Retweet Označi sa "sviđa mi se"
Semmle proslijedio/la je tweet
GitHub Security Lab 14. stu
Check out the GitHub Security Lab bounty program! . Write a query, find bugs, get rewarded.
Reply Retweet Označi sa "sviđa mi se"
Semmle 14. stu
Welcome to the GitHub Security Lab ! Join us and contribute to secure the world's code! Visit
Reply Retweet Označi sa "sviđa mi se"
Semmle 21. lis
Want to learn more about QL and how you can use it to find variants of vulnerabilities in your code? Join us for our Semmle User Group this Wednesday night at Mozilla. See the event details for more information.
Reply Retweet Označi sa "sviđa mi se"
Semmle 16. lis
Semmle security researcher discloses another integer overflow vulnerability in libssh2, which could potentially lead to information disclosure
Reply Retweet Označi sa "sviđa mi se"
Semmle 4. lis
Wondering how found 13 CVEs in U-boot? Watch his presentation "Using One Exploitable Zero-Day to Eradicate an Entire Class of Vulnerabilities" on-demand:
Reply Retweet Označi sa "sviđa mi se"
Semmle 3. lis
Is your code VUCA (Volatile, Uncertain, Complex, Ambiguous)? Let's see how the OODA Loops theory inspires our code review practices.
Reply Retweet Označi sa "sviđa mi se"
Semmle proslijedio/la je tweet
Fermin J. Serna 3. lis
Join us today for some fun and examples of finding vulnerabilities! Let's democratize security
Reply Retweet Označi sa "sviđa mi se"
Semmle 2. lis
In this video, discusses the libssh2 integer overflows and out-of-bounds read he recently discovered. See how it can be triggered by connecting to a malicious ssh server
Reply Retweet Označi sa "sviđa mi se"
Semmle 2. lis
Imagine if your dev team could have automated code review powered by security expertise? Tomorrow, join and to see how community-powered security can become a part of the developer’s workflow.
Reply Retweet Označi sa "sviđa mi se"
Semmle proslijedio/la je tweet
Nico Waisman 30. ruj
Thanks for everyone that attend my QL workshop at ! Here is some of the material covered during the workshop:
Reply Retweet Označi sa "sviđa mi se"
Semmle 1. lis
Are unit tests really effective in preventing bugs? We analyzed over 50k LGTM projects in Java, Python, and Javascript to find out.
Reply Retweet Označi sa "sviđa mi se"
Semmle proslijedio/la je tweet
LGTM 1. lis
Now in beta! LGTM is supporting Golang and we have some projects that you can explore. Check them out and suggest others you'd like us to analyze.
Reply Retweet Označi sa "sviđa mi se"
Semmle proslijedio/la je tweet
Sam Lanning 🇬🇧🇪🇺 28. ruj
Awesome meeting and hanging out with our CTF winner at
Reply Retweet Označi sa "sviđa mi se"
Semmle 30. ruj
. takes a deep dive into past Android vulnerabilities that exploited C++ pointers wrapped inside Java objects.
Reply Retweet Označi sa "sviđa mi se"
Semmle proslijedio/la je tweet
Sam Lanning 🇬🇧🇪🇺 27. ruj
Was super fun speaking at Amsterdam! Thanks to everyone who attended!
Reply Retweet Označi sa "sviđa mi se"