๐Ÿฒ Turtle Girl ๐Ÿ‰ (@7ur7l3_61rl) 's Twitter Profile
๐Ÿฒ Turtle Girl ๐Ÿ‰

@7ur7l3_61rl

InfoSec noob, main platform Linux, programmer C/C++, hoping to learn reverse engineering & exploit dev. Likes gifs a bit too much ๐Ÿข Pronouns: her/she

ID: 867791296492163072

calendar_today25-05-2017 17:15:42

3,3K Tweet

2,2K Takipรงi

1,1K Takip Edilen

Halvar Flake (@halvarflake) 's Twitter Profile Photo

Ben Nagy ๐Ÿฒ Turtle Girl ๐Ÿ‰ Finding instability is the same as finding a weird *state* though; whether you can prevent the wheels from falling off the weird machine you get is a different question. Also remember: The weird machine *need not* be turing complete to be useful.

SecurityGuill (@securityguill) 's Twitter Profile Photo

Hello everyone ๐Ÿ“š I would like to learn a new programming language. Which language is best suited for a new #InfoSec professional like myself ? Please reply with other suggestions. RT for reach, thank's all ๐Ÿ–ฅ ! #cybersecurity #developers #security #Coder

RET2 Systems (@ret2systems) 's Twitter Profile Photo

Feeling adventurous? Another exploit challenge has escaped from our servers. To support ecosystem diversity, the first woman/female-identifying solver will win a FREE seat to our browser exploitation training in June! Click here to play: ret2.io/battle

Maddie Stone (@maddiestone) 's Twitter Profile Photo

It's finally here! I have published my Intro to Android App Reverse Engineering workshop! If you're interested in learning how to begin RE'ing Android apps (both DEX and native code), check out this workshop. #reverseengineering #android #infosec maddiestone.github.io/AndroidAppRE

It's finally here! I have published my Intro to Android App Reverse Engineering workshop! If you're interested in learning how to begin RE'ing Android apps (both DEX and native code), check out this workshop. #reverseengineering #android #infosec
maddiestone.github.io/AndroidAppRE
LiveOverflow ๐Ÿ”ด (@liveoverflow) 's Twitter Profile Photo

The start of a new series. We will try to learn some basics about browser exploitation. Specifically we will look at JavaScriptCore - the JavaScript engine from WebKit. liveoverflow.com/getting-into-bโ€ฆ

The start of a new series. We will try to learn some basics about browser exploitation. Specifically we will look at JavaScriptCore - the JavaScript engine from WebKit.

liveoverflow.com/getting-into-bโ€ฆ
Niklas B (@_niklasb) 's Twitter Profile Photo

My Pwn2Own Firefox sbx escape got fixed: Language packs could be installed without user interaction via the AddonManager API, and this allowed for trivial XUL injection in the Chrome process (unsandboxed parent) mozilla.org/en-US/securityโ€ฆ

chiliz (@chiliz16) 's Twitter Profile Photo

๐Ÿฒ Turtle Girl ๐Ÿ‰ ropemporium.com has challenges dedicated to rop. picoctf19 has a basic, rop64. guess there are more easy, stack based for real ones,but I only recall this very detailed write up on a heap vuln, but it's really nice to reimplement!: nandynarwhals.org/cve-2016-10190/

ch3f (@damonsmall) 's Twitter Profile Photo

๐Ÿฒ Turtle Girl ๐Ÿ‰ @SensorLock Blaster and Sasser come to mind. Also wormable, so no user interaction was required, and as worms tend to do, they were self propagating. I worked for a hospital at the time (2003/4) and we had lots of vulnerable medical workstations, as we learned the hard way.