StormXploit (@stormxploit) 's Twitter Profile
StormXploit

@stormxploit

interested in pure #mathematics and #pwn, especially browsers exploitation.

ID: 959802159343730688

linkhttp://root-me.org/StormXplo-t calendar_today03-02-2018 14:54:01

1,1K Tweet

638 Takipçi

516 Takip Edilen

Connor McGarr (@33y0re) 's Twitter Profile Photo

Today I am releasing part 1 of a 3 part series on “modern” browser exploitation targeting Windows. Part 1 addresses configuring an environment, understanding how Chakra/ChakraCore manages objects in memory, and type confusion vulnerability analysis. connormcgarr.github.io/type-confusion…

inf0sec (@inf0sec1) 's Twitter Profile Photo

Hello ! FuckThatPacker is now integrated to CobaltStrike. You can now generate obufscated powershell payloads directly within CobaltStrike :D github.com/Unknow101/Fuck… retweet appreciated

Hello !
FuckThatPacker is now integrated to CobaltStrike. You can now generate obufscated powershell payloads directly within CobaltStrike :D
github.com/Unknow101/Fuck…

retweet appreciated
Charlie Bromberg « Shutdown » (@_nwodtuhs) 's Twitter Profile Photo

Here are the slides for my talk « Delegating Kerberos to bypass Kerberos delegation limitation » 😈 at Insomni'hack #INS22 thehacker.recipes/ad/movement/ke…

Here are the slides for my talk « Delegating Kerberos to bypass Kerberos delegation limitation » 😈 at <a href="/1ns0mn1h4ck/">Insomni'hack</a> #INS22 thehacker.recipes/ad/movement/ke…
sanguinarius (@sanguinarius_bt) 's Twitter Profile Photo

Bonjour Twitter, mon petit cousin fait des parcours de billes avec des gouttières et autres et j aurais voulu lui trouver des vidéos/ idées (il a 7 ans) donc voilà si vous avez ce genre de source :p

Samuel Groß (@5aelo) 's Twitter Profile Photo

Unfortunately my BlackHat US submission about the V8 sandbox was rejected, but we should still have some cool announcements to share about how we're making V8 harder to exploit soon. In any case I'll be around at the conference! :)

Jonathan Jacobi (@j0nathanj) 's Twitter Profile Photo

AND APPARENTLY, even though I have iCloud backuping enabled, none of my photos from the past 4 years were backuped 😢 I have a lot of sentimental value on my phone, and was wondering if any one of ya'll can think of a way to help me out... All ideas are welcome ♥️ 3/3

Read The Fancy Manual (SIGSEGv) (@sigsegv_event) 's Twitter Profile Photo

Hello 😀 Vous l'attendiez tous, on organise un meet "Not Before LeHack" car il sera pendant, le Vendredi 24 Juin à partir de 18h30, voici le lien pour vous inscrire 😉 framadate.org/PiEl4NlVM4n6qA… #infosec #rtfm #lehack

Erys (@erys_osint) 's Twitter Profile Photo

Retrouvez moi au leHACK ce week-end pour un workshop sur la traque des INTERPOL #MostWanted 🟥 #RedNotice fugitives grâce à l'OSINT (si, si, c'est possible !) Où : Osint Village, sur le stand d'OSINT-FR, Room 1 Quand : Dimanche, 2h30 Let's track Interpol Super Villains ! #osint #osint4good #roso

Worty (@_worty) 's Twitter Profile Photo

Just publish the write up for the challenge that i’ve created for leHACK 2022 :) You can read it here : github.com/W0rty/LeHack_S… Gg to teams who solved it :)

reverseame (@reverseame) 's Twitter Profile Photo

Exploiting an Unbounded memcpy in Parallels Desktop A Pwn2Own 2021 Guest-to-Host Virtualization Escape blog.ret2.io/2022/05/19/pwn…

Pixis (@hackanddo) 's Twitter Profile Photo

Check out new lsassy release! 🔸New dump modules 🔸Usable TGT are displayed alongside credentials 🔸DPAPI Masterkeys are retrieved For more details you can check release 3.1.2 description github.com/Hackndo/lsassy…

Pixis (@hackanddo) 's Twitter Profile Photo

Here we go, new articles are ready on a brand new and exciting topic, smart contracts security! ⛓️ ⏩To get things off to a good start, here's the first article, Blockchain 101. Happy reading! en.hackndo.com/blockchain/

Alex Plaskett (@alexjplaskett) 's Twitter Profile Photo

Hi Hackers, Let’s celebrate all our wins and inspire others by dropping a link below to a write-up of some public security research you’re the most proud of! Don’t be shy! Let’s goo! 👇 #CyberSecurity

Samuel Groß (@5aelo) 's Twitter Profile Photo

Sharing another V8 Sandbox design document more widely: docs.google.com/document/d/1CP… This one discusses how to protect code pointers - probably the most performance sensitive part touched by the sandbox - with (almost) no performance overhead.