t4r4ntu1a (@t4r4ntu1a) 's Twitter Profile
t4r4ntu1a

@t4r4ntu1a

Embedded security guy 💃

ID: 1492798741413339141

calendar_today13-02-2022 09:52:42

888 Tweet

45 Followers

542 Following

Olexander (@_aircorridor) 's Twitter Profile Photo

SCADA Hacking: The Most Important SCADA/ICS Attacks in History Although it won't predict the future, it can provide insights to how SCADA hacks can be implemented and their potential impacts on a nation's or region's infrastructure. hackers-arise.com/post/scada-hac… OccupytheWeb

Chaitanya (@ant4g0nist) 's Twitter Profile Photo

not sure why, but releasing Pyre - Ghidra's decompiler running fully in your browser. Drop an ELF / Mach-O / PE / wasm, navigate decompiled C with cmd-click + xrefs in Monaco. No server, no upload, binaries must never leave the page... source. github.com/ant4g0nist/pyre deployed

not sure why, but releasing Pyre - Ghidra's decompiler running fully in your browser. Drop an ELF / Mach-O / PE / wasm, navigate decompiled C with cmd-click + xrefs in Monaco. No server, no upload, binaries must never leave the page...

source. github.com/ant4g0nist/pyre
deployed
Olexander (@_aircorridor) 's Twitter Profile Photo

ChaCha20 is a cryptography algorithm built for speed, security, and simplicity. Learn more in our article about why it should be in your arsenal: hackers-arise.com/intermediate-c… OccupytheWeb Di Co11ateral

ChaCha20 is a cryptography algorithm built for speed, security, and simplicity.

Learn more in our article about why it should be in your arsenal:
hackers-arise.com/intermediate-c…
<a href="/three_cube/">OccupytheWeb</a> <a href="/DI0256/">Di</a> <a href="/co11ateral/">Co11ateral</a>
Tim Becker (@tjbecker_) 's Twitter Profile Photo

Can finally share our exploit's heap-grooming technique for this tricky bug in MariaDB, showing how we turned a character-constrained overflow into full RCE zeroday.cloud/blog/mariadb-c…

J⩜⃝mie Williams (@jamieantisocial) 's Twitter Profile Photo

you have to genuinely feel bad for the security analyst who reads this then tries to remove 𝚐𝚌𝚌 from enterprise Linux hosts.

you have to genuinely feel bad for the security analyst who reads this then tries to remove 𝚐𝚌𝚌 from enterprise Linux hosts.
Mr. OS (@ksg93rd) 's Twitter Profile Photo

#NetSec #Fuzzing Holy Grail PCAP github.com/SharonBrizinov… // capture file offering exceptional coverage across nearly all tcpdump/Wireshark encapsulation types and dissectors

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

New blog post: exploring NVIDIA’s open-source GPU drivers. Kernel modules, IOCTL attack surface, mmap primitives, UVM internals, and CPU↔GPU interactions (pushbuffers → firmware). Not just graphics: a large, exposed kernel surface. fuzzinglabs.com/exploring-nvid…

New blog post: exploring NVIDIA’s open-source GPU drivers.

Kernel modules, IOCTL attack surface, mmap primitives, UVM internals, and CPU↔GPU interactions (pushbuffers → firmware).

Not just graphics: a large, exposed kernel surface.

fuzzinglabs.com/exploring-nvid…
EXPLIoT (@expliot_io) 's Twitter Profile Photo

IoT security isn’t learned on slides. It’s learned on real hardware. UART • I2C • SPI • JTAG • SWD 24+ hands-on labs. Explore the EXPLIoT DIVA + Nano Combo: store.expliot.io/products/diva-…

chompie (@chompie1337) 's Twitter Profile Photo

malwareOwl was one of the first (and only) people to solve my Windows kernel CTF challenge last year. at the time they had never exploited a Windows UAF before.. very to cool to see their progress in a short period of time 🙂