Twitter | Pretraživanje | |
Tripoloski!
Information security enthusiasts | information system student | CTF player with | pwn
48
Tweetovi
413
Pratim
60
Osobe koje vas prate
Tweetovi
Tripoloski! proslijedio/la je tweet
b0bb 1. velj
Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
Leandro Barragan 28. sij
[Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! 30. sij
my writeup for secure login facebook bountycon
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
Fiona Redmond 🖤 5. sij
Retweet if you *also* don't have any CVE's but are still a valued member of the infosec community. 🖤
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
Alexander Popov 23. sij
========================= The Life and Incredible Adventures of One QEMU Bug (Which I Finally Fixed) ========================= A thread [1/n]
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! 24. sij
👀👀 seriously whatsapp?
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
ᴋʏᴢ⁴⁶◢͟│⁴⁶。 23. sij
Techi, you suffered enough, & from ppl who didn't know you. You were so young to endure it but you held on for 3 years. It isn't your fault. You need your piece of mind. We love you, & will keep loving & supporting you. Stay healthy❤️💚!!
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
b0bb 10. sij
I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! 12. sij
Odgovor korisniku/ci @xixilalaw1648 @ShinChan2018 i 3 ostali
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
nafod 21. pro
Pwning VMWare, Part 1: RWCTF 2018 Station-Escape
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
Visat 25. pro
RCE via PHP complex (curly) syntax
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
Michal Stanek @ 36c3 19. stu
Watch out for typos in your switch/case blocks, this actually compiles (lol). In this case it lets you overflow a kernel buffer with arbitrary data. From Dragon CTF 2019.
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! 17. pro
Odgovor korisniku/ci @malwareunicorn
nice , thanks!
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
cts 16. pro
the FORBIDDEN ctf tactics the pros DONT want you to know!
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! 6. pro
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
MalwareTech 3. pro
Woah, the scammer blocked me. All I did was ask how the weather is 😭
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
LiveOverflow 🔴 3. pro
This fashion store in Beijing is using a "SIGSEGV Segmentation fault" as backdrop! Picture taken by a team member currently traveling to China for the Real World CTF
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
p4 20. lis
Reply Retweet Označi sa "sviđa mi se"
Tripoloski! proslijedio/la je tweet
MalwareTech 30. ruj
The code scrolling on deadmau5's cube v3 is from a Windows keylogger 😆
Reply Retweet Označi sa "sviđa mi se"