4646
showing only twitter [see all]
synack/knockknock · GitHub
KnockKnock: displays persistent items (scripts, commands, binaries, etc.), that are set to run automatically on OS X
from twitter
8 hours ago
Mutant doesn't terminate · Issue #265 · mbj/mutant · GitHub
RT : mutation testing causing Ruby MRI to segfault, crash, lockup in a futex, all via executing valid pure Ruby code.
from twitter
2 days ago
Hardware Reverse Engineering Learning Platform • Hackaday Projects
RT : Hardware version of crackme and reverseme games for learning hardware reverse engineering techniques via
from twitter
5 days ago
Hacking with Pictures - Hack.LU 2014
RT : Slides from my presentation "Hacking with Pictures" at are now up on
from twitter
5 days ago
Solving "At gunpoint" from hack.lu 2014 with radare2
Solving "At gunpoint" from hack.lu 2014 with radare2 via
re  from twitter
6 days ago
Elf Parser
RT : Parser, tools for starter analysis on binaries: download:
noted a GUI not CLI
ELF  Linux  from twitter
6 days ago
Elf Parser
RT : Parser, tools for starter analysis on binaries: download:
noted a GUI not CLI
ELF  Linux  from twitter
6 days ago
twitter/BreakoutDetection · GitHub
Twitter open-sources Breakout Detection R package that uses robust E-Statistics
from twitter
6 days ago
vinta/awesome-python · GitHub
awesome-python - a curated list of awesome Python frameworks, libraries and software
from twitter
7 days ago
Index of /
MT : all hack.lu conference slides [all archive]
from twitter
10 days ago
Bitlackeys Research
RT : Saruman - Anti-forensics executable injector -
from twitter
12 days ago
gegel/onionphone · GitHub
RT : RT : VoIP tool for calling over Tor using Keccak sponge - interesting but crypto review is still required.
from twitter
13 days ago
SA-CORE-2014-005 - Drupal core - SQL injection | Drupal.org
RT : Drupal's latest vulnerability is beautiful. A SQL injection protection that is vulnerable to SQL injection itself:
from twitter
16 days ago
PEDA - Python Exploit Development Assistance for GDB
RT : PEDA - Python Exploit Development Assistance for GDB
from twitter
16 days ago
Analysis of the Linux backdoor used in freenode IRC network compromise | NCC Group
RT : Analysis of the Linux backdoor used in freenode IRC network compromise | NCC Group
from twitter
17 days ago
bolshchikov/js-must-watch · GitHub
RT : Must-watch CSS and JavaScript talks.



Bookmarked.
from twitter
20 days ago
AllThingsSmitty/must-watch-css · GitHub
RT : Must-watch CSS and JavaScript talks.



Bookmarked.
from twitter
20 days ago
Full Disclosure: OpenSSH <=6.6 SFTP misconfiguration exploit for 64bit Linux
RT : SSH users with SFTP only and procfs access can execute commands via /proc/self/mem :-P
from twitter
20 days ago
Reverse Engineering of a commercial spyware for iOS and Android // Speaker Deck
RT : The slides for my talk "Reverse Engineering of a commercial spyware for iOS and Android" -
HackInBo  from twitter
20 days ago
iWorm The First OSX Bot To Use Reddit For CnC: Expect Mac malware to surge
iWorm The First OSX Bot To Use Reddit For CnC: Expect Mac malware to surge
from twitter
23 days ago
BlackArch Linux - Penetration Testing Distribution
BlackArch Linux - lightweight expansion to Arch Linux for penetration testers and security researchers
from twitter
23 days ago
Intercepting and decrypting SSL communications between Android phone and 3rd party server - MyHowTo.org
Intercepting and decrypting SSL communications between Android phone and 3rd party server
from twitter
24 days ago
toolswatch/vFeed · GitHub
vFeed - Open Source Cross Linked and Aggregated Local Vulnerability Database main repository
from twitter
26 days ago
A Few Thoughts on Cryptographic Engineering: Why can't Apple decrypt your iPhone?
RT : I took some of my noodling from last week and condensed it into a blog: 'Why can't Apple decrypt your iPhone?'
from twitter
27 days ago
Great list of resources: data science, visualization, machine learning, big data - Data Science Central
RT : Checking out "Great list of resources: data science, visualization, machine le" on Data Science Central:
from twitter
27 days ago
Untitled (http://www.set-ezine.org/ezines/set/21/0x08.txt)
MT : [ ASM y Buffer Overflows ] by Doing - Se que es viejuno... - [in Spanish]
from twitter
27 days ago
NoSQL SSJI Authentication Bypass | Imperva Data Security Blog
RT : good observation on sec blog on how to pass negated arguments to PHP, potentially bypassing authentication:
from twitter
27 days ago
Project Zero: More Mac OS X and iPhone sandbox escapes and kernel bugs
RT : Project Zero has eliminated the last of the OS X / iOS sandbox escapes! Great work, !
from twitter
28 days ago
mubix/shellshocker-pocs · GitHub
Collection of Proof of Concepts and Potential Targets for
ShellShocker  from twitter
28 days ago
Phison Electronics | [USBDev.ru]
RT : USB keys flashing/dumping/formatting 8051 firmware utilities (in russian)
from twitter
28 days ago
Storage (SSD, HDD) | [USBDev.ru]
RT : Lots of SDK/firmware tools for USB Keys/Flash/SSD to download for many, many brands. Definitely worth having a look
from twitter
28 days ago
panda/tainted_instructions.md at master · moyix/panda · GitHub
RT : New tutorial by Tim Leek on using taint analysis in PANDA to find all instructions accessing tainted data:
from twitter
29 days ago
Setting the WinDbg Symbol Search Path (article + video) - OSR
RT : WinDbg noobs often waste time with useless !analyze -v output. Here's how to fix your WinDbg symbols (article+video):
from twitter
4 weeks ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 2009 academic ai analysis android anonymous antisec apple apps aslr asm aws backdoor backdoors backtrack backup bash bitlocker blackhat blackhateu blackhole blind_sqli blog bluetooth bm book books boot boot2root bootkit browser brucon bsideschallenge bsideslondon burp canvas captcha chart cheatsheet checkitout checklist chrome cloud cms cocoa code codebits codebits2011 coding comedy comic conf crack crawler cryptoparty csp csrf css ctf cyber_warfare db dc4420 deal deals defcon design dev dfir dfirsummit diy dns doc dominator dropbox duqu electronics emet encryption erlang escalating ettercap event exploit fail fb firefox flame forensic forensics fr framework free fuzzer fuzzing game games gaming gdb geek gnome google googleplay graph graphs gtd gui hack hacking hackingteam hardware hashcat heartbleed homepage honeypot howto html html5 icon icons ida ids ie ie6 ie9 infosec injection ios iphone ipv6 iso itsec java javascript jobs jquery js jvm kernel kibana lab learn leopard lfi links linux live lowpower mac mail malware malwareanalysis manager manual map mbr metasploit mimikatz mitm mobile model modeling money monitoring movies movp mq msf mysql netbook netsec network news nginx nginxday nmap notsosecure ohm2013 ollydbg opensource openssl oracle os oss osx owasp paper password patch pdf pentest pentestlab personal pgp php pki plot portable powershell privacy productivity programming proxy pshitt pwn2own python qt raspberrypi rce re recipes recon14 reverse_engineering reverseengineering reversing ror ruby sandbox sans scada scanner screencast screencasts search security securitymanager seo shellcode slides sniffer snippet snmp snowleopard social software source sqli sqlinjection ssh ssl startups stat stats stuxnet suricata svg sync sysadmin syslog tech terminal testbed thn threat tip tips tool tools toolswatch tor tricks trojan truestory tutorial tv tweak ui url usb video videos virtualization viz vm voip volatility vpn vulnerability waf web web-dev web2py webdev webvulscan wii win windbg windows windows8 wordpress wpa writeup wxpython xss xxe zeronights

Copy this bookmark:



description:


tags: