Twitter | Pretraživanje | |
SensePost
Work like hell, Share all you know, Abide by your handshake, Have fun. - Dan Geer
1.250
Tweetovi
195
Pratim
5.593
Osobe koje vas prate
Tweetovi
SensePost proslijedio/la je tweet
TROOPERS Conference 3. velj
Check out our new trainings at TROOPERS : - Fuzzing source-code and binary-only targets like a pro - Mastering - Unplugged; Modern WiFi Hacking Your seat is waiting for you! 🙋🏼‍♂️🙋🏽
Reply Retweet Označi sa "sviđa mi se"
SensePost 27. sij
One day was bored, so he looked around his room - a few days later, he had reversed how his Playstation streamed audio to it's dualshock controller An epic walkthrough from idea to success.
Reply Retweet Označi sa "sviđa mi se"
SensePost 27. sij
In 2019, we trained over 500 students, that's nearly 10 students for every person employed at SensePost. What a privilege, thank you to all our students. We hope we make some small impact in your job/life/career.
Reply Retweet Označi sa "sviđa mi se"
SensePost 24. sij
Come join us in Heidelberg.
Reply Retweet Označi sa "sviđa mi se"
SensePost proslijedio/la je tweet
_leon_jacobs(💥) 12. pro
What an incredible year filled with late nights, EPIC hacks, ridiculous one liners, admin:admin and many other wtfs together with the crew . I got to meet many amazing people, see amazing things and learn more than ever! But now, my couch needs me. Happy holidays!
Reply Retweet Označi sa "sviđa mi se"
SensePost proslijedio/la je tweet
Pierrick 5. pro
So, I updated BIRP from and , a great tool to test on mainframes, to use the latest versions of x3270 and the py3270 library
Reply Retweet Označi sa "sviđa mi se"
SensePost proslijedio/la je tweet
Rogan Dawes 3. pro
I wrote a thing about getting shells through Logitech Unifying dongles. Let me know what you think!
Reply Retweet Označi sa "sviđa mi se"
SensePost 2. pro
Odgovor korisniku/ci @smushon @BlackHatEvents
Thanks Moshe! Hope you're enjoying the course.
Reply Retweet Označi sa "sviđa mi se"
SensePost proslijedio/la je tweet
Dominic White 1. pro
Team SP is assembled for EU. Look forward for meeting new and alumni students tomorrow. BlackHat’s setup operation is always a thing of beauty to watch in motion. cc
Reply Retweet Označi sa "sviđa mi se"
SensePost 29. stu
What , & spent their SenseCon doing - hacking Doom. From dynamic hooking to static patching all with Frida.
Reply Retweet Označi sa "sviđa mi se"
SensePost 29. stu
A compendium of peripheral RF hacking, past, present and future by the R0ganat0r ().
Reply Retweet Označi sa "sviđa mi se"
SensePost 29. stu
If it wasn't for a good cause ... Our mobro's final moments before the big shave.
Reply Retweet Označi sa "sviđa mi se"
SensePost proslijedio/la je tweet
Oege de Moor 12. stu
Wonderful example and nice intro to variant analysis by :
Reply Retweet Označi sa "sviđa mi se"
SensePost 12. stu
A primer on from Including how he used it to find CVE-2019-15937/8 in the barebox bootloader & a t-shirt challenge.
Reply Retweet Označi sa "sviđa mi se"
SensePost 6. stu
The second session at the is our BlackOps Hacking - Master Level. Check out the details here:
Reply Retweet Označi sa "sviđa mi se"
SensePost 6. stu
Reply Retweet Označi sa "sviđa mi se"
SensePost proslijedio/la je tweet
Felipe Molina 1. stu
Just another day in the office
Reply Retweet Označi sa "sviđa mi se"
SensePost proslijedio/la je tweet
Black Hat 1. stu
Combining their hands-on hacking fundamentals course and enterprise infrastructure hacking course, will present an extended 4-day Training at in London, December 2-5.
Reply Retweet Označi sa "sviđa mi se"
SensePost proslijedio/la je tweet
Black Hat 4. stu
If you want to understand how criminals run hacking campaigns and emulate them, this course is for you. Register early to save on “BlackOps Hacking - Master Level” taught by at
Reply Retweet Označi sa "sviđa mi se"
SensePost proslijedio/la je tweet
Hector Cuesta 5. ruj
After reading article about the multiple vulnerabilities in U-Boot I decided to learn some QL. This leads me to the discovery of CVE-2019-15937/15938 in the Barebox Bootloader, the power of QL/LGTM for variant analysis is amazing. Excited to keep playing with it.
Reply Retweet Označi sa "sviđa mi se"