Jaresbell (@jaresbell) 's Twitter Profile
Jaresbell

@jaresbell

Software Engineer at Google | Offensive Security Researcher | Curious | Hobbyist Commodore 64 game dev | Opinions are my own.

ID: 28657846

calendar_today03-04-2009 21:29:12

123 Tweet

28 Followers

296 Following

Nadav Grossman (@nadavgrossman) 's Twitter Profile Photo

A code execution vulnerability we found in WinRAR, existed for about 19 years. enjoy :) research.checkpoint.com/extracting-cod…

Jackson T. (@jackson_t) 's Twitter Profile Photo

CVE-2019-9730: Local privilege elevation in Synaptics Sound Device Driver package. Multiple OEMs affected. Exploit and write-up here: jackson-t.ca/synaptics-cxut….

Alisa Esage Шевченко (@alisaesage) 's Twitter Profile Photo

“The great escapes of VMWare” (2017) blackhat.com/docs/eu-17/mat… < technically deep and thorough review of known vulns in VMware with patch analysis over the most common attack vectors 👍🏻👍🏻

Casey Muratori (@cmuratori) 's Twitter Profile Photo

It is well past time for laws that require all mission-critical software to have publicly published source code. Flying planes, driving cars, and using voting machines whose software hasn't been publicly analyzed is a dangerous (and deadly) policy choice. bloomberg.com/news/articles/…

Binni Shah (@binitamshah) 's Twitter Profile Photo

Analyzing KSL0T (Turla’s Keylogger) Part 1 : 0ffset.net/reverse-engine… Part 2 – Reupload : 0ffset.net/reverse-engine…

Analyzing KSL0T (Turla’s Keylogger) Part 1 : 0ffset.net/reverse-engine…

Part 2 – Reupload : 0ffset.net/reverse-engine…
Meeting C++ (@meetingcpp) 's Twitter Profile Photo

Phantastic Code Smells and where to find them - Arne Mertz - Meeting C++ 2019 youtube.com/watch?v=tvGSoN… #cpp #cplusplus

Phantastic Code Smells and where to find them - Arne Mertz - Meeting C++ 2019
youtube.com/watch?v=tvGSoN…
#cpp
#cplusplus
Karsten Hahn (@struppigel) 's Twitter Profile Photo

Good tip of my colleague: This is how you can recognize 64 bit code wrongly interpreted as 32 bit code. It has lots of dec eax instructions because 0x48 is also used to signify 64 bit operand size. (32 bit interpretation is first picture, 64 bit second)

Good tip of my colleague: 

This is how you can recognize 64 bit code wrongly interpreted as 32 bit code. It has lots of dec eax instructions because 0x48 is also used to signify 64 bit operand size.

(32 bit interpretation is first picture, 64 bit second)
Samuel Groß (@5aelo) 's Twitter Profile Photo

I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage: googleprojectzero.blogspot.com/2020/01/remote…

AIfredo 0rtega (@ortegaalfredo) 's Twitter Profile Photo

Side channel research is getting ridiculous (x.com/stefant/status…) Here's "malware" that transmit data by changing the wifi signal power:

Side channel research is getting ridiculous (x.com/stefant/status…)
Here's "malware" that transmit data by changing the wifi signal power:
Alisa Esage Шевченко (@alisaesage) 's Twitter Profile Photo

In case you missed it, the Apple’s Security Bounty is now open and offering some decent bounties that (try to) match black market offerings in a sassy move that I can easily endorse: developer.apple.com/security-bount… (with a remark that I didn’t try it myself yet)

Binni Shah (@binitamshah) 's Twitter Profile Photo

Automated Deobfuscation of Ploutus ATM Malware : crowdstrike.com/blog/ploutus-a… Additional Resource : How to Deobfuscate Maze Ransomware : crowdstrike.com/blog/maze-rans…

Automated Deobfuscation of Ploutus ATM Malware : crowdstrike.com/blog/ploutus-a… 

Additional Resource : How to Deobfuscate Maze Ransomware : crowdstrike.com/blog/maze-rans…
GitHub Security Lab (@ghsecuritylab) 's Twitter Profile Photo

"Exploits are really the closest thing to magic spells we have in this world" according to Halvar Flake. Kev demystifies an exploit of a double-free vulnerability in Ubuntu github.co/3pVse0G

"Exploits are really the closest thing to magic spells we have in this world" according to Halvar Flake. <a href="/kevin_backhouse/">Kev</a> demystifies an exploit of a double-free vulnerability in Ubuntu  github.co/3pVse0G
Rohit (@sec_r0) 's Twitter Profile Photo

Learn WebAppSec With Fun - Part 1 In frame: - #log4j - HPP - Domain Lowering - SOP Please RT for reach. More @http://securityzines.com #infosec #cybersecurity #pentesting #ctf #oscp #windows #cheatsheet #redteaming #burpsuite #bugbounty #bugbountytips #zines #security

Learn WebAppSec With Fun - Part 1 

In frame:
- #log4j
- HPP
- Domain Lowering
- SOP

Please RT for reach.
More @http://securityzines.com

#infosec #cybersecurity #pentesting #ctf #oscp #windows #cheatsheet #redteaming #burpsuite #bugbounty #bugbountytips #zines #security
Rohit (@sec_r0) 's Twitter Profile Photo

Learn WebAppSec With Fun - Part 3 In frame: - Stored XSS - Burp Suite Please RT for reach. More @http://securityzines.com #infosec #cybersecurity #pentesting #ctf #oscp #windows #cheatsheet #redteaming #burpsuite #bugbounty #bugbountytips #zines #security

Learn WebAppSec With Fun - Part 3

In frame:
- Stored XSS 
- <a href="/Burp_Suite/">Burp Suite</a>

Please RT for reach.
More @http://securityzines.com

#infosec #cybersecurity #pentesting #ctf #oscp #windows #cheatsheet #redteaming #burpsuite #bugbounty #bugbountytips #zines #security
Binni Shah (@binitamshah) 's Twitter Profile Photo

Mindmap : This repository contains many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them : github.com/Ignitetechnolo… credits Hacking Articles

Mindmap : This repository contains many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structure to give brief details about them : github.com/Ignitetechnolo… credits <a href="/hackinarticles/">Hacking Articles</a>