0xNinja (@0x_ninja) 's Twitter Profile
0xNinja

@0x_ninja

@[email protected]

ID: 1004037132296638465

linkhttps://0xninja.fr calendar_today05-06-2018 16:28:01

417 Tweet

709 Takipçi

468 Takip Edilen

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Very interesting blog post by Aviram Hassan 🐻 and @Mehulwastaken on how to hook #Go from #Rust. metalbear.co/blog/hooking-g… #rustlang #golang #programming #hooking #learning #infosec #infotech

Very interesting blog post by <a href="/Aviramyh/">Aviram Hassan 🐻</a> and @Mehulwastaken on how to hook #Go from #Rust.

metalbear.co/blog/hooking-g… 

#rustlang #golang #programming #hooking #learning #infosec #infotech
Tomtombinary (@tomtombinary) 's Twitter Profile Photo

Space Empire V delphi exploitation: tomtombinary.xyz/articles/space… Gates of Troy vanilla stack buffer overflow : tomtombinary.xyz/articles/gates…

Justine Tunney (@justinetunney) 's Twitter Profile Photo

My dream has finally come true. I've been working on a 160kb virtual machine named Blink. It's now capable of emulating programs as complex as GCC and Qemu. We can now vendor Linux toolchain binaries in our build configs and have them run across platforms. github.com/jart/blink

My dream has finally come true. I've been working on a 160kb virtual machine named Blink. It's now capable of emulating programs as complex as GCC and Qemu. We can now vendor Linux toolchain binaries in our build configs and have them run across platforms. github.com/jart/blink
Sergi Martinez (@zlowram_) 's Twitter Profile Photo

Here's a fresh new blogpost about the exploitation of #CVE_2022_32250 on Linux kernel 5.18.1. Hope you like it! (any feedback is welcome): blog.exodusintel.com/2022/12/19/lin…

McCaulay (@_mccaulay) 's Twitter Profile Photo

The following multi-part blog series will cover how I developed the mast1c0re exploit on both the PlayStation 4 and PlayStation 5. Stay tuned for the remaining blog posts. mccaulay.co.uk/mast1c0re-intr…

tmp.0ut (@tmpout) 's Twitter Profile Photo

📣 Announcing the tmp.0ut Volume 3 Call For Papers! For information on submission guidelines and ways to contact us, visit the CFP page: tmpout.sh/blog/vol3-cfp.…

📣 Announcing the tmp.0ut Volume 3 Call For Papers!

For information on submission guidelines and ways to contact us, visit the CFP page: tmpout.sh/blog/vol3-cfp.…
Zeecka 🥀 (@zeecka_) 's Twitter Profile Photo

Cette année j'ai eu la chance de participer à l'organisation du BreizhCTF 2025. Retrouvez mes corrections sur mon blog zeecka.fr/blog/breizh_20…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Did you enjoy the latest blogpost on PHP filter chains? Well, our ninja Remsio strikes again with a new article detailing how you can abuse them to leak files from the targeted system, as well as a freshly developed tool to exploit it! synacktiv.com/publications/p…

xThaz (@0xthaz) 's Twitter Profile Photo

Mon exploit pour la RCE non-authentifiée sur Covenant a enfin été publié par Exploit-DB (lien en bas du blog 🐦) Il s'inscrit dans la suite de challenge que j'ai réalisé pour la DG'hAck. Le détail de l'exploitation et le WU de mon challenge sont dispo : xthaz.fr/posts/dghack/

ATTL4S (@danilj94) 's Twitter Profile Photo

Releasing a complete rewrite of "Understanding Windows Lateral Movements" - 71 more slides - Better explanations - Less errors and bad assumptions If you liked the 2019 version, you should check this one out Available at attl4s.github.io

Releasing a complete rewrite of "Understanding Windows Lateral Movements"

- 71 more slides
- Better explanations
- Less errors and bad assumptions

If you liked the 2019 version, you should check this one out

Available at attl4s.github.io
Avigayil Mechtinger (@abbymch) 's Twitter Profile Photo

Part 1 of "Linux Rootkits Explained" series is out! Great chance to learn from scratch about dynamic linker hijacking via #LD_PRELOAD, with real-world references and a hands-on example ⌨️ bit.ly/3O3vZ1K Wiz

Part 1 of  "Linux Rootkits Explained" series is out!

Great chance to learn from scratch about dynamic linker hijacking via #LD_PRELOAD, with real-world references and a hands-on example ⌨️

bit.ly/3O3vZ1K
<a href="/wiz_io/">Wiz</a>