 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Les Tweets pour 0xcharlie |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "0xcharlie" (455 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter 0xcharlie[2012-10-10] - 15:44:54 - @Ryanymous neither, just doing payloads.[2012-10-10] - 15:44:54 - RT @mikko: Pinkie Pie has hacked Chrome again. Full exploit submitted to Pwnium. https://t.co/vSJKsgOS#HITB2012KUL[2012-10-10] - 00:37:07 - I'm speaking via video at hitb tonight, sorry I couldn't make it in person. Thought it was tomorrow, stupid intl date line.[2012-10-10] - 00:37:07 - Metasploit for OSX needs some love.[2012-10-10] - 00:37:07 - @mubix @dinodaizovi yea, was trying to get my os x meterpreter working with latest metasploit with no luck :([2012-10-09] - 04:07:14 - I find it horribly depressing that blade runner was supposed to take place in only 7 years from now. We suck.[2012-10-06] - 00:03:03 - I very surprised, it seems metasploit doesn't seem to support ssl communications with exploit payloads.[2012-09-28] - 23:22:33 - RT @nmap: Hakin9 Magazine's Nmap issue successfully trolled by security researchers! http://t.co/WHhYVfk6[2012-09-28] - 03:04:23 - RT @WeldPond: @dildog If Wikipedia gets DDoS'd kids won't be able to do their homework. Its a single point of failure for the entire edu ...[2012-09-22] - 18:55:50 - @Valo the only big differences are the inclusion OS aslr and dep I think[2012-09-21] - 21:05:43 - @blah53667133 use grsec patches.[2012-09-21] - 21:05:43 - @dinodaizovi if you hadn't said you won pwn2own in one night of work, I'd never have gotten into Mac hacking, I blame you![2012-09-20] - 18:58:02 - RT @p0sixninja: @pod2g's SMS spoofing bug was fixed[2012-09-19] - 20:16:13 - RT @dragosr: Android totally pwned through NFC #esw12 #pwn2own priv escalation, full shell (!) trojan on an S3 - @mwrlabs rules[2012-09-18] - 20:56:08 - RT @RolfRolles: Thought of the day: vulnerability analysis is to reverse engineering as physics is to mathematics[2012-09-13] - 19:56:05 - @PuurpleTiger Thanks! I don't own a VPN so can't help you there.[2012-09-11] - 02:39:46 - RT @DrPizza: Similarly, eight 0-days in 3 years: be a nation-state. I think @0xcharlie has probably demoed more than that at pwn2own![2012-09-11] - 02:39:46 - @drraid I am a math professional and 8 0-days in Starcraft is impressive! Of wait, I misunderstood, nm.[2012-09-08] - 16:49:08 - RT @bradarkin: The memory corruption Flash Player 0day exploits all target bugs that were pretty clearly identified by fuzzing, not via ...[2012-09-07] - 19:45:02 - RT @thegrugq: ?@msuiche: QOTD The group seemingly has an unlimited supply of zero-day vulnerabilities.? in Flash and IE? What ...[2012-08-17] - 14:18:55 - @4Dgifts @agelastic @matthew_d_green vupen did pwn2own many times which amounts to giving bugs for money.[2012-08-17] - 14:18:55 - The main reason I like to speak at DEFCON is that once on Numb3rs they said how all the badasses present there.[2012-08-17] - 14:18:55 - RT @chriseng: All of the @MarsCuriosity code is written in C, on a CPU selected 8 years ago. http://t.co/B52j3k8E thought it was java...[2012-08-17] - 14:18:55 - @donicer @chriseng @marscuriosity I think it says it's written in c but has its testing framework in python, not python that writes the c.[2012-08-11] - 11:05:02 - @alexgkirk dlink dub-h7 7 port USB hub.[2012-08-10] - 10:37:11 - RT @justinschuh: After two and a half years of work, we finally have Flash in the full Chrome sandbox on all versions of Windows: http:/ ...[2012-08-07] - 12:45:00 - I've been trying to get debugging working on this android device for 4 days. This is why android sucks. Dear google, gimmie gdb, kthx![2012-08-07] - 12:45:00 - @timb_machine will Debian gdb be able to handle/see android processes you think?[2012-08-02] - 10:18:30 - Spent the morning reverse engineering a binary then just now found the source online. I love when that happens![2012-08-02] - 10:18:30 - RT @WeldPond: NSA Career page for DEFCON 20 attendees http://t.co/EqCIjlQO better if the govt didn't say ain't even if trying to be cool[2012-07-29] - 02:50:51 - RT @invisig0th: Highlight of defcon so far: Watching @thedarktangent get hassled about not having a badge by a new goon who didn't know ...[2012-07-29] - 02:50:51 - RT @dildog: I like the idea of spoofing gps and checking in on foursquare on the inside of various company datacenters.[2012-07-27] - 01:33:37 - RT @argilo: @0xcharlie I worked out the format of the Black Hat RFID cards. Data is encrypted with a fixed XTEA key. My decoder: https:/ ...[2012-07-23] - 11:52:24 - RT @p0sixninja: Wow, Chronic-Dev / iPhone Dev were nominated for epic 0wnage ponies. and @pod2g was nominated for best privilege escalation[2012-07-23] - 11:52:24 - Vacation over, 12 hours at home, now off to Vegas for Blackhat. It's a tough life.[2012-07-22] - 05:17:56 - @michaelkearn Of those topics, I only know about NFC. If you wait a week, check out my whitepaper's references.[2012-07-22] - 05:17:56 - Mobile pwn2own. I already reported bugs for my Blackhat talk, so come watch me demo $120,000 worth of exploits. http://t.co/5mkaxuxz :O[2012-07-17] - 13:43:11 - I can't get on the corporate VPN anymore but can get to email via my iPhone. Don't send email requiring long replies or attachments, kthx.[2012-07-16] - 03:25:18 - RT @i0n1c: There will be an iOS Hacker's Handbook signing session at BlackHat http://t.co/zjJ8i2wl[2012-07-14] - 22:55:53 - After Blackhat I'll try submitting a new one. Everyone else should too.[2012-07-14] - 22:55:53 - @kokanin blackhat and defcon.[2012-07-14] - 22:55:53 - Got the pwn2own jacket back from the dry cleaners in preparation for blackhat/defcon :) http://t.co/iYBRD5no[2012-07-04] - 04:23:14 - In preparation for blackhat, I broke out my Rosetta Stone leet speak CD's for review.[2012-07-01] - 03:14:23 - RT @tmanning: Always use stack buffers so your overflows are protected by stack canaries (cc @jduck1337 @0xcharlie)[2012-07-01] - 03:14:23 - RT @chrisrohlf: An SSH remote in our community is like the Higgs Boson in physics - My friend, and master of the english language, @s7 ...[2012-06-22] - 07:01:48 - Being a Bluehat prize finalist has got to ruin Blackhat for you though. The suspense would be too much. $200k or some free software???[2012-06-22] - 07:01:48 - @nudehaberdasher My submission of run Linux instead didn't make it either :([2012-06-22] - 07:01:48 - RT @djrbliss: Five remotely exploitable kernel vulns in the Linux kernel's (currently unused) NFC stack: http://t.co/30Z6Pgr5[2012-06-20] - 03:15:00 - RT @ryanaraine: There's a new player in the 0day vuln-acquisition space (ZDI defectors) http://t.co/iNSPG8tp[2012-06-20] - 03:15:00 - I'm in at defcon, yippee! I heard they kicked out @nudehaberdasher for it so it's a double win for our society ;)[2012-06-20] - 03:15:00 - Anybody got a copy of Frisbee Lite USB device fuzzer? It seems to no longer be on the NGS servers...[2012-06-18] - 00:32:10 - RT @donicer: ?@BoingBoing: Market for zero-day vulnerabilities incentivizes programmers to sabotage their own work http://t.co/US30cWbX? ...
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|