|
xᴏʀᴋɪᴡɪ🥝
@
xorkiwi
fs:[0]
|
|
Security Research 🛡🔑 | Reverse Engineering ⏮🔍| Malware Stuff ☣🕷 | Passionate InfoSec #CTF Player🖱 | Living in #Switzerland 🇨🇭
|
|
|
4.576
Tweetovi
|
154
Pratim
|
477
Osobe koje vas prate
|
| Tweetovi |
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
Fermat's Library
@fermatslibrary
|
6 h |
|
357686312646216567629137 is the largest left truncatable prime.
You always get a prime no matter how many leading digits are omitted. 🧐 pic.twitter.com/v8fZ6mtLgX
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
gerhart
@gerhart_x
|
5 h |
|
Hyper-V virtual machine worker process (vmwp.exe) logical components from presentation. twitter.com/dwizzzleMSFT/s… pic.twitter.com/5JMklMSjIS
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
radare
@radareorg
|
9 h |
|
👀 Looking forward #r2con2020? 👀
⏮Here's a sneak peak on this year plans, so you can all start warming the engines! radare.org/con/2020/ 🏎 🔥 🔥 pic.twitter.com/suIubjJJdA
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
Galactic Curiosity
@GalacCuriosity
|
22 h |
|
17 Equations that changed the world! pic.twitter.com/ydeIZR2LBD
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
dawgyg
@thedawgyg
|
3. velj |
|
When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.
#bugbountytip #bugbountytip #bugbounty
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
Saar Amar
@AmarSaar
|
3. velj |
|
ROPs (like any indirect branch) are mitigated using PAC (sign LR with SP as a salt). But PAC isn't enough for stack protection (even setting aside the Qualcomm attack). It doesn't protect on other data on the stack, such as restore regs. So, old stack cookies...:) @qwertyoruiopz pic.twitter.com/2d46SFjJsz
|
||
|
|
||
|
xᴏʀᴋɪᴡɪ🥝
@xorkiwi
|
4. velj |
|
I love this xDDD twitter.com/ydklijnsma/sta…
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
Xentropy
@SamuelAnttila
|
1. velj |
|
I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)
netsec.expert/2020/02/01/xss…
#bugbountytips pic.twitter.com/Mdygq1PI9Z
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
JP Aumasson
@veorq
|
3. velj |
|
someone claims to have "cracked" RSA, should I tell him that Time AI already did? pic.twitter.com/PaCQmDRPOS
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
Nicolas Grégoire
@Agarri_FR
|
3. velj |
|
I hope that nobody uses it as a defensive measure... 😱 twitter.com/mikispag/statu…
|
||
|
|
||
|
xᴏʀᴋɪᴡɪ🥝
@xorkiwi
|
3. velj |
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
Mark Simos
@MarkSimos
|
2. velj |
|
Need a #ZeroTrust Reference Architecture? Check out this one showing how @Microsoft technology enables this strategy/access model.
Slide 14 of CISO Workshop Module 3
@ajohnsocyber @MalwareJake @_sarahyo @RavivTamir @JohnLaTwC #Cybersecurity
docs.microsoft.com/en-us/microsof… pic.twitter.com/t2eChLzW8r
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
MaTt
@harr0ey
|
2. velj |
|
[COM hijacking]
While I was looking for some methods related to the COM hijacking technique, I found a new method that allows you to hijack COM and execute Scriptlet instructions :)
Registry import file:
gist.github.com/homjxi0e/caa27… pic.twitter.com/o8oX1mSypF
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
b0bb
@0xb0bb
|
1. velj |
|
Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets). github.com/0xb0bb/karkinos pic.twitter.com/T76K3lkQ3r
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
Yarden Shafir
@yarden_shafir
|
2. velj |
|
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't.
@aionescu and I wrote about these!
windows-internals.com/dkom-now-with-…
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
CodeColorist
@CodeColorist
|
2. velj |
|
VSCode x @fridadotre
* VSCode based GUI
* Interactive terminal
* Remote file browser (Yes!)
* Open source
Not on market yet. But you can built it from the source:
github.com/chichou/vscode… pic.twitter.com/sG5UhDy2Wd
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
Xh4H
@RiftWhiteHat
|
1. velj |
|
Attention CTF players (and organizers, CTFd v2.0.0 - v2.2.2 has a serious vulnerability (CVE-2020-7245) in which an attacker could perform account takeover using a leading-trailing on the Registration form. It has been fixed in v2.2.3. github.com/CTFd/CTFd/rele… Make sure to update!
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
Daniel Isaksen
@duniel_pls
|
2. velj |
|
Don't know why but I like super consist write-ups like these. Easy to follow and remember. twitter.com/hussein98d/sta…
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
Kate Compton, actual doctor of weird ai
@GalaxyKate
|
1. velj |
|
I don't mean to be mean, but it's pointing guns at people RIGHT now through police dispatch systems.
The "wait till it has a gun" language is harmful silicon valley futurism because IT HAS A GUN RIGHT NOW
|
||
|
|
||
| xᴏʀᴋɪᴡɪ🥝 proslijedio/la je tweet | ||
|
Florian Hansemann
@CyberWarship
|
1. velj |
|
Vulnerability Modeling with Binary Ninja
#infosec
blog.trailofbits.com/2018/04/04/vul…
|
||
|
|
||