0xmissing's profile picture.

missing

@0xmissing

내가 좋아할 만한 콘텐츠
missing 님이 재게시함

Mitra is a tool to generate binary polyglots. github.com/corkami/mitra

angealbertini's tweet image. Mitra is a tool to generate binary polyglots.
github.com/corkami/mitra

missing 님이 재게시함

How does Fuzzilli generate JavaScript code? The new --inspect=history mode can help answer that! If enabled, Fuzzilli will include the "history" of a FuzzIL program when writing it to disk. Here is what that looks like: gist.github.com/saelo/e947dbac… Also try --inspect=types! :)


missing 님이 재게시함

still aint found him


missing 님이 재게시함

A few days ago I analyzed an ITW IE JScript UAF 1day exploit, it had been patched in April 2020. I think it might be CVE-2020-0968 and here is a poc of it:

jq0904's tweet image. A few days ago I analyzed an ITW IE JScript UAF 1day exploit, it had been patched in April 2020. I think it might be CVE-2020-0968 and here is a poc of it:

missing 님이 재게시함

Exploitation of LAN vulnerability found in Firefox for Android I tested this PoC exploit on 3 devices on same wifi, it worked pretty well. I was able to open custom URL on every smartphone using vulnerable Firefox (68.11.0 and below) found by @init_string gitlab.com/gitlab-com/gl-…


missing 님이 재게시함

Introducing #BlindSide: 1 buffer overflow to mount Speculative Blind ROP attacks that repeatedly probe the address space, craft arbitrary memory read gadgets, and enable reliable kernel exploitation in minutes - despite #FGKASLR #XoM #Spectre mitigations: vusec.net/projects/blind…


missing 님이 재게시함

it's been a long few months since i last posted anything i've drawn and put out. i didn't end up making anything concrete. but i did mess around and try out some new things. here some of what i did.

madpractitioner's tweet image. it's been a long few months since i last posted anything i've drawn and put out. i didn't end up making anything concrete. but i did mess around and try out some new things. here some of what i did.
madpractitioner's tweet image. it's been a long few months since i last posted anything i've drawn and put out. i didn't end up making anything concrete. but i did mess around and try out some new things. here some of what i did.
madpractitioner's tweet image. it's been a long few months since i last posted anything i've drawn and put out. i didn't end up making anything concrete. but i did mess around and try out some new things. here some of what i did.
madpractitioner's tweet image. it's been a long few months since i last posted anything i've drawn and put out. i didn't end up making anything concrete. but i did mess around and try out some new things. here some of what i did.

missing 님이 재게시함
gf_256's tweet image.

missing 님이 재게시함
gf_256's tweet image.

missing 님이 재게시함

In the last 10-15y I spent a significant amount of my professional life finding bugs and tentatively writing exploits for them to prove or disprove risk. One conclusion: bugs are overhyped and exploits are underhyped. Pay some overdue respect to all exploits writers out there!


missing 님이 재게시함

u think you know me then boom. i secretly knew a lot about computers this whole time.....


missing 님이 재게시함

The bug report is now public at bugs.chromium.org/p/project-zero…

For Samsung, there are new vulnerabilities in the custom Qmage codec fixed as SVE-2020-17675 (no CVE yet), which have similar severity to the Qmg bugs exploited in April. Full details in the P0 tracker are restricted until 90 days elapse under our 2020 disclosure policy trial.



missing 님이 재게시함

getting circumsized


missing 님이 재게시함

YES, the Google CTF is happening soon! Check g.co/ctf for details.


missing 님이 재게시함

omg


missing 님이 재게시함

1ST PLACE! Thanks so much to all the organizers, other finalists, and everyone who followed along and supported us. A special shout-out to @solarwine_ctf for staying strong til the end and getting top points! @hack_a_sat @defcon #HackASat

pfs_ctf's tweet image. 1ST PLACE! Thanks so much to all the organizers, other finalists, and everyone who followed along and supported us. A special shout-out to @solarwine_ctf for staying strong til the end and getting top points! @hack_a_sat @defcon #HackASat

missing 님이 재게시함

Late night, but ready for some space hacking tomorrow! 🛰️

pfs_ctf's tweet image. Late night, but ready for some space hacking tomorrow! 🛰️

missing 님이 재게시함

Pretty crazy amount of high quality research being published on twitter in the last few weeks between blackhat and other random drops, getting difficult to keep up!


missing 님이 재게시함

Share the white paper and slide of TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices I presented @BlackHatEvents github.com/secmob/TiYunZo…


United States 트렌드

Loading...

Something went wrong.


Something went wrong.