7721
showing only twitter [see all]
Twitter
RT : NoScript bypass by
<p id=x>javascrip<x>t:alert(<x>1)</p><math><a href="#*/=x.innerText,a" xml:base…
from twitter
yesterday
Twitter
RT : Dumping Windows Credentials from the Credential Manager with , doesn't require any admin rights 👌…
PowerShell  from twitter
yesterday
Twitter
RT : Magic “Nothing Up My Sleeve” Numbers
from twitter
yesterday
AMOSSYS Security Blog
An introduction of Use-After-Free detection in binary code by static analysis
re  from twitter
yesterday
Twitter
RT : The Mutiny Fuzzing Framework and Decept Proxy for evaluating a variety of network applications and devices :…
from twitter
2 days ago
Twitter
RT : Cool blog from 's forensics team: detecting and recovering event logs deleted by NSA's eventlogedit tool…
from twitter
2 days ago
Twitter
RT : Janus vulnerability allows attackers to modify Android apps without affecting their signatures
MobileSecurity  from twitter
2 days ago
Untitled (https://www.youtube.com/watch?v=1xrdwhisW-M)
RT : Remotely Cracking Bluetooth Enabled Gun Safes : , Demo :
from twitter
4 days ago
Jailbreaking Apple Watch // Speaker Deck
RT : Jailbreaking Apple Watch, updated for BlackHat Europe 2017 -
BHEU2017  BHEU  from twitter
4 days ago
Twitter
NSjail - light-weight process isolation tool, making use of Linux namespaces and seccomp-bpf syscall filters (with…
from twitter
5 days ago
Chess.com - Play Chess Online - Free Games
Google's AlphaZero Destroys Stockfish In 100-Game Match -
from twitter
5 days ago
Debugging an evil Go runtime bug - marcan.st
RT : New blog post: Debugging an evil Go runtime bug
from twitter
6 days ago
GitHub - google/timesketch: Collaborative forensic timeline analysis
Timesketch - Digital Forensic Timeline Collaborative Analysis tool
dfir  from twitter
6 days ago
Thinking in Graphs: Exploring with Timesketch – Timesketch – Medium
Timesketch - Digital Forensic Timeline Collaborative Analysis tool
dfir  from twitter
6 days ago
Twitter
RT : Abusing RFC-1342 to spoof email addresses, vulnerability found by . Most mail clients are vulnerable!…
from twitter
7 days ago
Twitter
RT : We have started a write-up repository for challenges: . Eventually, those will get to…
ph0wn  from twitter
7 days ago
write-ups-2017/ph0wn-ctf-2017 at master · cryptax/write-ups-2017 · GitHub
RT : We have started a write-up repository for challenges: . Eventually, those will get to…
ph0wn  from twitter
7 days ago
Untitled (https://www.youtube.com/watch?v=wjvCrOvmveY)
RT : [DEMO] Retrieving function names by checksums using + code of the original malware:
libPeConv  from twitter
8 days ago
How to Extract Content from VMDK Files
RT : How to Extract Content from VMDK Files Sometimes, you’ll find yourself needing access to the contents of a VM…
ifh  from twitter
9 days ago
Twitter
RT : JavaScript weirdness of the day: How to get a timestamp in milliseconds?

+new Date()

Duh, obviously. Yes, with th…
from twitter
10 days ago
MB blog: Yet Another Google Caja bypasses hat-trick
RT : Blogged! Three Google Caja sandbox escapes thanks to new ECMAScript features :)

vrp  bugbounty  caja  from twitter
11 days ago
Twitter
RT : Vulnerability Walkthrough: 7zip CVE-2016-2334 HFS+ Code Execution Vulnerability
from twitter
11 days ago
Twitter
RT : Modifying the Python language in just a few minutes
from twitter
11 days ago
Twitter
RT : Firmware is the new Black – Analyzing Past 3 years of BIOS/UEFI Security Vulnerabilities …
from twitter
12 days ago
“Huge Dirty COW” (CVE-2017–1000405) – Bindecy – Medium
RT : Huge Dirty COW vulnerability (CVE-2017–1000405) writeup and PoC
from twitter
12 days ago
JPCERT/CC Blog: Visualise Event Logs to Identify Compromised Accounts - LogonTracer -
RT : New Blog Post - Visualise Event Logs to Identify Compromised Accounts - LogonTracer - ^ST
from twitter
12 days ago
Twitter
RT : new post about Xen, Nitro, and bare metal: AWS EC2 Virtualization 2017
reinvent  from twitter
12 days ago
AWS EC2 Virtualization 2017
RT : new post about Xen, Nitro, and bare metal: AWS EC2 Virtualization 2017
reinvent  from twitter
12 days ago
OpenEMR: CVE-2017-16540
OpenEMR: setup.php allows unauthenticated attackers to steal the contents of the backend database CVE-2017-16540
from twitter
13 days ago
Twitter
(Unpatched) Symantec Encryption Desktop Local Privilege Escalation - Exploiting an Arbitrary Hard Disk Read/Write V…
from twitter
13 days ago
Objective-See
Why <blank> Gets You Root on Apple macOS High Sierra - tracking down the cause a serious authentication flaw
from twitter
13 days ago
Enable virtualization-based protection of code integrity | Microsoft Docs
Enable virtualization-based protection of code integrity | Microsoft Docs
from twitter
13 days ago
Twitter
RT : Part 4 of Windows Kernel Exploitation Tutorial is live on my blog...
Pool Feng-Shui --> Pool Overflow…
from twitter
14 days ago
Tricky CORS Bypass in Yahoo! View
RT : ☢ Write-Up Alert: Tricky CORS bypass in Yahoo!
from twitter
14 days ago
Twitter
RT : My 40th EN livestream will be a special one! I'll have a special guest - - and we'll talk about the techn…
from twitter
14 days ago
Twitter
RT : I am working on hooking IAT with -> the hooked app: the loader:…
libPeConv  from twitter
14 days ago
Twitter
RT : How to use an inexpensive RTL-SDR DVB-USB tuner dongle on Windows to do Tempest snooping on nearby screens and moni…
from twitter
17 days ago
Twitter
PyREbox - Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework…
from twitter
17 days ago
Twitter
RT : Leveraging VMware's RPC Interface for Fun and Profit
Exploit  VMWare  ExploitDev  Vuln  from twitter
17 days ago
Twitter
RT : We published on GitHub a Secure Coding Practices Guide. Learn and contribute:
I…
JavaScript  from twitter
17 days ago
GitHub - Checkmarx/JS-SCP: JavaScript Secure Coding Practices guide
RT : We published on GitHub a Secure Coding Practices Guide. Learn and contribute:
I…
JavaScript  from twitter
17 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 159460 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade beroot bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost blueteam bluetooth bm book books boot boot2root bootkit bro_ids browser browsers brucon bruteforce bruteforcer bsideschallenge bsideslisbon bsideslondon bugbounty burp bypass campc canvas capstone capstoneinside captcha capture centos charliehebdo chart cheatsheet checkitout checklist chisel chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf confoo connections crack crackme crawler cronjob crossplatformdisassembler crosssitescripting crowbar crypto cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber cyber_warfare cybercrime cybersecurity dahboo7 dailywtf data dataexfiltrationtoolkit datascience db dbgkit dc4420 deal deals debugger debugging decompiler deeplearning defcon defense derbycon design det detection dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dl dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption equationgroup erlang escalating ettercap event exploit exploitation exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny future fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git github gnome gnu golang google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackerone hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitb2017ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec infrastructure injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan jaff java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kekeo kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning macos macosx mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking neutrinobot news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pe penetrationtest pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy privilegeescalation processexplorer productivity programming proxy pshitt pwn2own python qt quotes ransomware raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remcos remwa repy2exe retrogaming reverse reverse_engineering reverseengineering reversing rkt rodeoide root rop ror rowhammer ruby ructfe samba sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shadowbrokers shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source sp17 space splunk sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tbt tech terminal testbed thn threat threathunting tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 uefi ui unix url usa usb usenix vault7 video videos vietnam virginia virtualization viz vm voip volatility vpn vulnerability vulnhub waf wearables web web-dev web2py webapp webdev websec websecurity webvulscan wii wikileaks win windbg windows windows8 wordpress worldphotographyday wpa wpscan writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: