An Intro to x86_64 Reverse Engineering | Leo Tindall
RT : An Intro to x86_64 Reverse Engineering on Linux with Radare
from twitter
2 hours ago
Twitter
makin - reveal anti-debugging tricks
UPDATE: add x86 support
from twitter_favs
6 hours ago
Twitter
Found a privilege escalation 0day this week thanks to 's amazing work on symbolic link bugs. Check out hi…
from twitter_favs
11 hours ago
The Vault Of The Atomic Space Age
Finally got my Emacs set up the way I like it
from twitter_favs
13 hours ago
Twitter
Finally got my Emacs set up the way I like it
from twitter_favs
13 hours ago
Twitter
I'm calling it CarbonBlackJack. 😀
Details when I can.
from twitter_favs
14 hours ago
Twitter
CryKeX - Linux Memory Cryptographic Keys Extractor
Browsers  CryKeX  AntiForensic  from twitter_favs
15 hours ago
Untitled (https://www.youtube.com/watch?v=HadpwNlWCXY&feature=youtu.be&a)
Proof of concept of 0day exploit for Google Chrome for more information about this 0day contact with...
from twitter_favs
17 hours ago
Twitter
Parsing in Python: tools and libraries
from twitter_favs
20 hours ago
Twitter
Poor man's EWS bruteforce:

for i in `cat users.txt`; do echo "testing: $i"; curl -I --ntlm…
from twitter_favs
22 hours ago
(500) https://mail.domain.com/EWS/Exchange.asmx
Poor man's EWS bruteforce:

for i in `cat users.txt`; do echo "testing: $i"; curl -I --ntlm…
from twitter_favs
22 hours ago
2999babb...1d70 | VMRay Analyzer Report
[Analysis] WSF downloads a payload that sets-up a server to accept incoming connections …
from twitter_favs
22 hours ago
Twitter
[Analysis] WSF downloads a payload that sets-up a server to accept incoming connections …
from twitter_favs
22 hours ago
The ROBOT Attack - Return of Bleichenbacher's Oracle Threat
ROBOT TLS attack: Return Of Bleichenbacher’s Oracle Threat
from twitter
22 hours ago
Twitter
RT : 📣 V8 has native support for JavaScript code coverage. Tools like and Istanbul can now access V8’s c…
from twitter
yesterday
Road to Exim RCE - Abusing Unsafe Memory Allocator in the Most Popular MTA | DEVCORE
RT : [SuggestedReading] Road to Exim RCE - Abusing Unsafe Memory Allocator in the Most Popular MTA
from twitter
yesterday
Masquerade VM Walkthrough Part 1 | linkcabin
In preperation of Vulnhub Submission. Masquerade CTF VM Walkthrough Part 1:
from twitter_favs
yesterday
Twitter
RT : NoScript bypass by
<p id=x>javascrip<x>t:alert(<x>1)</p><math><a href="#*/=x.innerText,a" xml:base…
from twitter
3 days ago
Twitter
RT : Dumping Windows Credentials from the Credential Manager with , doesn't require any admin rights 👌…
PowerShell  from twitter
3 days ago
Twitter
Android Vulnerabilities Overview (AVO) - database of known Android security vulnerabilities
MobileSecurity  from twitter_favs
3 days ago
Twitter
(remember) THE GREAT ESCAPES OF VMWARE: A RETROSPECTIVE CASE STUDY OF VMWARE GUEST-TO-HOST ESCAPE VULNERABILITIES -…
from twitter_favs
3 days ago
Twitter
RT : Magic “Nothing Up My Sleeve” Numbers
from twitter
3 days ago
AMOSSYS Security Blog
An introduction of Use-After-Free detection in binary code by static analysis
re  from twitter
3 days ago
Node.js Security - XSS, Vulnerable Dependencies, Snyk, OWASP
Node.js Security - XSS, Vulnerable Dependencies, Snyk, OWASP
from twitter_favs
3 days ago
Twitter
RT : The Mutiny Fuzzing Framework and Decept Proxy for evaluating a variety of network applications and devices :…
from twitter
3 days ago
Twitter
RT : Cool blog from 's forensics team: detecting and recovering event logs deleted by NSA's eventlogedit tool…
from twitter
3 days ago
Twitter
Coming soon to an iPhone X near you :-)
from twitter_favs
4 days ago
Twitter
RT : Janus vulnerability allows attackers to modify Android apps without affecting their signatures
MobileSecurity  from twitter
4 days ago
Twitter
Bank loan officer: why are you borrowing money, and what is your product name?

Entrepreneur: I want to make cows h…
from twitter_favs
4 days ago
Twitter
Last livestream of the year will be with () who you might know from his amazing binary poste…
from twitter_favs
4 days ago
Twitter
RT : Fun way to get a remote shell via a .csv file, without the use of powershell.exe

fillerText1,fillerText2,fillerTex…
from twitter_favs
4 days ago
Twitter
TIL with Firefox, PDF dictionaries don't have to be closed!
Take that, parsers! and no warning because YOLO !
62 ch…
from twitter_favs
5 days ago
Twitter
HP had a keylogger in the keyboard driver. Logging was disabled by default but could be enabled by setting a regist…
from twitter_favs
5 days ago
HP keylogger – Bytes – ZwClose on bytes
So HP had keylogging code (disabled by default) in one of their keyboard drivers... 🤔 …
from twitter_favs
5 days ago
Twitter
So HP had keylogging code (disabled by default) in one of their keyboard drivers... 🤔 …
from twitter_favs
5 days ago
Twitter
*yawn* the things everyone knew already report is out...
from twitter_favs
5 days ago
Twitter
BYTE, April 1993, p. 120
Full page illustration by Lyn Boyer Pennington to the article on data visualization.
from twitter_favs
5 days ago
Twitter
Debugging a memory leak. (Vincent van Gogh, 1890)
devart  from twitter_favs
5 days ago
Twitter
Did you know that when your security sandbox/appliance submit only the file hash "in the cloud", you let real attac…
from twitter_favs
5 days ago
Twitter
RT : Spinner: Semi-Automatic Detection of Pinning without Hostname Verification
MobileSecurity  AndroidSecurity  from twitter_favs
5 days ago
Twitter
Thank you , and since they are really handy, I added them all a…
from twitter_favs
6 days ago
Untitled (https://www.youtube.com/watch?v=1xrdwhisW-M)
RT : Remotely Cracking Bluetooth Enabled Gun Safes : , Demo :
from twitter
6 days ago
Twitter
0d1n v2.5 - Web Security Tool to Make Fuzzing at HTTP/S
Bruteforce  0d1n  from twitter_favs
6 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 159460 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade beroot bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost blueteam bluetooth bm book books boot boot2root bootkit bro_ids browser browsers brucon bruteforce bruteforcer bsideschallenge bsideslisbon bsideslondon bugbounty burp bypass campc canvas capstone capstoneinside captcha capture centos charliehebdo chart cheatsheet checkitout checklist chisel chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf confoo connections crack crackme crawler cronjob crossplatformdisassembler crosssitescripting crowbar crypto cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber cyber_warfare cybercrime cybersecurity dahboo7 dailywtf data dataexfiltrationtoolkit datascience db dbgkit dc4420 deal deals debugger debugging decompiler deeplearning defcon defense derbycon design det detection dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dl dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption equationgroup erlang escalating ettercap event exploit exploitation exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny future fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git github gnome gnu golang google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackerone hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitb2017ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec infrastructure injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan jaff java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kekeo kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning macos macosx mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking neutrinobot news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pe penetrationtest pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy privilegeescalation processexplorer productivity programming proxy pshitt pwn2own python qt quotes ransomware raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remcos remwa repy2exe retrogaming reverse reverse_engineering reverseengineering reversing rkt rodeoide root rop ror rowhammer ruby ructfe samba sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shadowbrokers shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source sp17 space splunk sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tbt tech terminal testbed thn threat threathunting tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 uefi ui unix url usa usb usenix vault7 video videos vietnam virginia virtualization viz vm voip volatility vpn vulnerability vulnhub waf wearables web web-dev web2py webapp webdev websec websecurity webvulscan wii wikileaks win windbg windows windows8 wordpress worldphotographyday wpa wpscan writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: