Twitter | Pretraživanje | |
xᴏʀᴋɪᴡɪ🥝
Security Research 🛡🔑 | Reverse Engineering ⏮🔍| Malware Stuff ☣🕷 | Passionate InfoSec Player🖱 | Living in 🇨🇭
4.576
Tweetovi
154
Pratim
477
Osobe koje vas prate
Tweetovi
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
Fermat's Library 6 h
357686312646216567629137 is the largest left truncatable prime. You always get a prime no matter how many leading digits are omitted. 🧐
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
gerhart 5 h
Hyper-V virtual machine worker process (vmwp.exe) logical components from presentation.
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
radare 9 h
👀 Looking forward ? 👀 ⏮Here's a sneak peak on this year plans, so you can all start warming the engines! 🏎 🔥 🔥
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
Galactic Curiosity 22 h
17 Equations that changed the world!
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
dawgyg 3. velj
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
Saar Amar 3. velj
ROPs (like any indirect branch) are mitigated using PAC (sign LR with SP as a salt). But PAC isn't enough for stack protection (even setting aside the Qualcomm attack). It doesn't protect on other data on the stack, such as restore regs. So, old stack cookies...:)
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 4. velj
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
Xentropy 1. velj
I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
JP Aumasson 3. velj
someone claims to have "cracked" RSA, should I tell him that Time AI already did?
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
Nicolas Grégoire 3. velj
I hope that nobody uses it as a defensive measure... 😱
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 3. velj
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
Mark Simos 2. velj
Need a Reference Architecture? Check out this one showing how technology enables this strategy/access model. Slide 14 of CISO Workshop Module 3
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
MaTt 2. velj
[COM hijacking] While I was looking for some methods related to the COM hijacking technique, I found a new method that allows you to hijack COM and execute Scriptlet instructions :) Registry import file:
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
b0bb 1. velj
Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
Yarden Shafir 2. velj
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
CodeColorist 2. velj
VSCode x * VSCode based GUI * Interactive terminal * Remote file browser (Yes!) * Open source Not on market yet. But you can built it from the source:
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
Xh4H 1. velj
Attention CTF players (and organizers, CTFd v2.0.0 - v2.2.2 has a serious vulnerability (CVE-2020-7245) in which an attacker could perform account takeover using a leading-trailing on the Registration form. It has been fixed in v2.2.3. Make sure to update!
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
Daniel Isaksen 2. velj
Don't know why but I like super consist write-ups like these. Easy to follow and remember.
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
Kate Compton, actual doctor of weird ai 1. velj
Odgovor korisniku/ci @_Greyist
I don't mean to be mean, but it's pointing guns at people RIGHT now through police dispatch systems. The "wait till it has a gun" language is harmful silicon valley futurism because IT HAS A GUN RIGHT NOW
Reply Retweet Označi sa "sviđa mi se"
xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet
Florian Hansemann 1. velj
Vulnerability Modeling with Binary Ninja
Reply Retweet Označi sa "sviđa mi se"