3354
showing only twitter_favs [see all]
A Look into XPC Internals: Reverse Engineering the XPC Objects
My new blog "A Look into XPC Internals: Reverse Engineering the XPC Objects"
from twitter_favs
yesterday
Twitter
If our small minds, for some convenience, divide this universe, into parts - physics, biology, geology, astronomy,…
from twitter_favs
yesterday
Twitter
Il y'a plus d'intelligence et d'expertise dans le geste de cet homme que dans tous les papiers d'Alain Minc
from twitter_favs
6 days ago
Twitter
More attack hardware with onboard cellular!
As of today, it’s now working in the USA. Still in testing, but keep an…
from twitter_favs
6 days ago
AlphaZero Resources | DeepMind
And remember you can download all 210 of the new games - along with 100 shogi games - here:
from twitter_favs
6 days ago
Twitter
When playing with kernel crash reproducers, it's important to use a naming scheme that will prevent you from accide…
from twitter_favs
7 days ago
Twitter
Well I’ve reached 20 years old! Love the cake and the easter egg ❤️
from twitter_favs
13 days ago
hashcat v5.1.0
hashcat 5.1.0 released! Full changelog:
from twitter_favs
14 days ago
Twitter
hashcat 5.1.0 released! Full changelog:
from twitter_favs
14 days ago
Twitter
Unscii – a bitmapped Unicode font for blocky graphics
from twitter_favs
14 days ago
How Chaos Cures Metaphysics
Chaos Makes the Multiverse Unnecessary ()
from twitter_favs
16 days ago
Twitter
"Creativity is intelligence having fun."

-- A. Einstein (1879 - 1955)
from twitter_favs
17 days ago
Peerlyst
How to perform reverse engineering using IDA Pro
from twitter_favs
18 days ago
Twitter
Another brutal secret revealed! 😎
Payload to bypass simple email validation in PHP

"><svg/onload=confirm(1)>".y…
from twitter_favs
21 days ago
Twitter
If you want to know the name of inside-site s3 bucket - just put %c0 into url
from twitter_favs
23 days ago
Twitter
Hi virtualbox, Do you have a bountry program? I guess not x)
escapingyourvms  from twitter_favs
26 days ago
Twitter
Fnord v0.5
- new test case: obfuscated VBS
- scoring adjustments: structure scored higher than payload (e.g. "^ ^ ^…
from twitter_favs
26 days ago
Twitter
IoT-Pentesting-Methodology:Resources to help get started with IoT Pentesting

IoT  HardWare  from twitter_favs
27 days ago
Twitter
New blog post! Introduction to Part 2: Analysing a Basic Program -
from twitter_favs
29 days ago
Twitter
Oh nice! Basically Kali for malware analysts. Great way to get started in malware analysis and reverse engineering…
from twitter_favs
4 weeks ago
Twitter
Late to twitter today as the incredible staff at were helping to bring our new baby into the world! Th…
from twitter_favs
4 weeks ago
Twitter
Red teamers, you can turn off Defender from admin powershell with ‘Set-MpPreference -DisableRealTimeMonitoring $tru…
from twitter_favs
4 weeks ago
Twitter
30-seconds-of-code : Curated collection of useful JavaScript snippets that you can understand in 30 seconds or less…
from twitter_favs
4 weeks ago
Twitter
chrome://net-internals/ can save your life during some or
dns  redteam  tips  pentest  from twitter_favs
4 weeks ago
Twitter
BREAKING: Potential hijack underway. ThousandEyes detected intermittent availability issues to Google services from…
from twitter_favs
4 weeks ago
Twitter
"This has got to be one of the most powerful photographs I have ever seen. Above is a battalion of the Cameron High…
from twitter_favs
4 weeks ago
Twitter
Got an application that converts letters to upper case? Here's a small trick on how you can turn it into an XSS!…
from twitter_favs
5 weeks ago
Twitter
For all considering to do the from

Check these great ressources:

First
from…
SLAE  OSCE  from twitter_favs
5 weeks ago
Twitter
Just some great mates sharing dinner. Got you all over this, .
from twitter_favs
5 weeks ago
Twitter
Practitioners industry: Curtis Walker & (SeL4) & (Mythril, smar…
from twitter_favs
5 weeks ago
Twitter
Not sure how I should respond to this constructive feedback on my parenting skills..
from twitter_favs
5 weeks ago
Twitter
Parrot Security 4.3 - Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind…
from twitter_favs
5 weeks ago
Twitter
Technician does phone switch maintenance, New York, 1938
from twitter_favs
5 weeks ago
Log in | Tumblr
Technician does phone switch maintenance, New York, 1938
from twitter_favs
5 weeks ago
Twitter
This week, Andrew () will be guest editing the account. Andrew is Director of Engineering at DeepMind H…
from twitter_favs
5 weeks ago
Twitter
We all know

Trust hurts

Trust considers harmful

Trust makes us vulnerable ...

So here goes the level of…
from twitter_favs
5 weeks ago
Twitter
1337 followers. Yes you are!
from twitter_favs
6 weeks ago
Twitter
Allow me to summarize x86 side channel attacks:

Spectre v1: speculation is insecure by design
Spectre v2: secure b…
from twitter_favs
6 weeks ago
Twitter
iOS 12 / OS X *Remote Kernel Heap Overflow (CVE-2018-4407) POC* in a tweet:
pip install scapy
sudo scapy
send(IP(d…
from twitter_favs
6 weeks ago
Twitter
Google Home (in)Security - Google Home Hub allows near full remote unauthenticated control by an (undocumented) AP…
from twitter_favs
6 weeks ago
Twitter
fuxploider : File upload vulnerability scanner and exploitation tool :
from twitter_favs
6 weeks ago
Twitter
Creating a 3G Raspberry Pi Smartphone :
from twitter_favs
6 weeks ago
Twitter
(remember) Sandboxing Windows Defender Antivirus:

1. setx /M MP_FORCE_USE_SANDBOX 1
2. Restart the machine.

Thi…
from twitter_favs
6 weeks ago
Twitter
-2018-3246 Weblogic XML External Entity (XXE). I utilized Weblogic 12.1.3.0.0 for the test.
CVE-2018-3246  from twitter_favs
7 weeks ago
Twitter
I would rather have questions that can't be answered than answers that can't be questioned.
from twitter_favs
7 weeks ago
Twitter
After receiving $700,000 to research blockchain, the government's Digital Transformation Agency has discovered out…
from twitter_favs
7 weeks ago
Twitter
Announcing Feedzai Genome - sequencing the DNA of financial crime patterns to identify connected transactions withi…
from twitter_favs
7 weeks ago
GitHub - Rev3rseSecurity/WebMap: Nmap Web Dashboard and Reporting
My new project: WebMap, a Web Dashboard for Nmap XML Report it's a beta and any kind of con…
from twitter_favs
7 weeks ago
Twitter
My new project: WebMap, a Web Dashboard for Nmap XML Report it's a beta and any kind of con…
from twitter_favs
7 weeks ago
Twitter
Abusing SeDebugPrivilege without Mimikatz! Simple example, I injected Wininet.exe proc with malicious shellcode the…
from twitter_favs
7 weeks ago
(500) http://htrace.sh
: Simple shell script to debugging http/https connection tracing, response headers and mixe…
from twitter_favs
7 weeks ago
Twitter
: Simple shell script to debugging http/https connection tracing, response headers and mixe…
from twitter_favs
7 weeks ago
Bug Trio Affecting Eight D-Link Models Leads to Full Compromise
Bug Trio Affecting Eight D-Link Models Leads to Full Compromise
from twitter_favs
8 weeks ago
Twitter
Today we're open sourcing TRFL, a library of building blocks for reinforcement learning agents - containing key alg…
from twitter_favs
8 weeks ago
Twitter
Really enjoyed giving the annual Ellison-Cliffe lecture this evening. Such a privilege to be working in…
from twitter_favs
8 weeks ago
Twitter
Amazing JS:
[]["filter"]["constructor"](unescape(escape(…
from twitter_favs
8 weeks ago
Twitter
Some great articles and editorials recently from on digital health and healthcare AI. On medical apps…
from twitter_favs
8 weeks ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 159460 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade beroot bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost blueteam bluetooth bm book books boot boot2root bootkit bro_ids browser browsers brucon bruteforce bruteforcer bsideschallenge bsideslisbon bsideslondon bugbounty burp bypass campc canvas capstone capstoneinside captcha capture centos charliehebdo chart cheatsheet checkitout checklist chisel chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf confoo connections crack crackme crawler cronjob crossplatformdisassembler crosssitescripting crowbar crypto cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber cyber_warfare cybercrime cybersecurity dahboo7 dailywtf data dataexfiltrationtoolkit datascience db dbgkit dc4420 deal deals debugger debugging decompiler deeplearning defcon defense derbycon design det detection dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dl dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption equationgroup erlang escalating ettercap event exploit exploitation exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny future fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git github gnome gnu golang google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackerone hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitb2017ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec infrastructure injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan jaff java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kekeo kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning macos macosx mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking neutrinobot news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pe penetrationtest pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy privilegeescalation processexplorer productivity programming proxy pshitt pwn2own python qt quotes ransomware raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remcos remwa repy2exe retrogaming reverse reverse_engineering reverseengineering reversing rkt rodeoide root rop ror rowhammer ruby ructfe samba sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shadowbrokers shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source sp17 space splunk sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tbt tech terminal testbed thn threat threathunting tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 uefi ui unix url usa usb usenix vault7 video videos vietnam virginia virtualization viz vm voip volatility vpn vulnerability vulnhub waf wearables web web-dev web2py webapp webdev websec websecurity webvulscan wii wikileaks win windbg windows windows8 wordpress worldphotographyday wpa wpscan writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: