 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Les Tweets pour stephenfewer |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "stephenfewer" (53 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter stephenfewer[2012-09-27] - 07:54:28 - @woodwardgraham my toolchain was Win based but shouldnt be too hard to build on Linux. Drop me as mail if u have any questions on the source[2012-09-14] - 15:08:56 - RT @pa_kt: I've been working on a Turing complete ROP compiler for a while. Example payload computing the Fibonacci sequence: http://t.c ...[2012-07-18] - 06:53:12 - RT @cBekrar: New research blog by our pwner @n_joly : IE9/Win7 exploitation with ASLR bypass using an awesome method: RGB colors! http:/ ...[2012-02-29] - 23:42:38 - @cneckar @thezdi I was happy to hand over the entire exploit (3 0days) to MSFT, and yes I was informed of my options.[2011-10-15] - 17:08:18 - RT @hdmoore Long-time metasploit dev Patrick Webster threatened over responsibly reporting a threat to public privacy: http://t.co/naJxUUn3[2011-06-27] - 11:34:50 - I?m voting for Metasploit T-shirt design 36! http://bit.ly/e4wsPt #metasploitswag[2011-06-14] - 23:04:02 - RT @hdmoore: Announcing the Metasploit Exploit Bounty: 30 Exploits, $5,000.00, in 5 weeks: http://bit.ly/m4s41D[2011-05-30] - 08:23:54 - RT @PiotrBania: my new paper is out: Securing The Kernel via Static Binary Rewriting and Program Shepherding - http://tinyurl.com/6xcavhe[2011-05-15] - 03:31:27 - RT @PiotrBania: my new paper is out: Securing The Kernel via Static Binary Rewriting and Program Shepherding - http://tinyurl.com/6xcavhe[2011-05-09] - 16:28:15 - RT @PiotrBania: my new paper is out: Securing The Kernel via Static Binary Rewriting and Program Shepherding - http://tinyurl.com/6xcavhe[2011-05-07] - 10:42:23 - Pwn2own bug#1 patched with ms11-018, will have to blog about it later. Apparently its in the wild, anyone got samples, would like to compare[2011-05-06] - 19:08:51 - RT @kernelpool: Modern Kernel Pool Exploitation: Attacks and Techniques. More on reliability and some bonus slides on MS11-034: http://b ...[2011-04-14] - 15:38:03 - I?m voting for Metasploit T-shirt design 36! http://bit.ly/e4wsPt #metasploitswag[2011-04-14] - 15:38:03 - Pwn2own bug#1 patched with ms11-018, will have to blog about it later. Apparently its in the wild, anyone got samples, would like to compare[2011-04-14] - 15:38:03 - RT @daveaitel: Exploit Necromancy in TCMalloc ? Reviving the 4-to-N Byte Overflow Primitive with Insert to FreeList[X] http://dlvr.it/NSDk7[2011-03-14] - 23:05:08 - ...and a big shout out to @aaronportnoy, @WTFuzz and all @thezdi crew for putting on a great pwn2own! :)[2011-03-10] - 09:08:02 - Awesome, just popped ie8 at pwn2own :)[2011-02-24] - 18:18:12 - awesome! going first against IE at pwn2own next month :)[2010-12-16] - 07:26:02 - RT @d0c_s4vage: my analysis and 0day exploit for the IE CSS import DoS http://bit.ly/dQ1Tp6 :^)[2010-10-19] - 22:19:09 - RT @hdmoore: Announcing Metasploit Pro: http://bit.ly/doTOZ4 (Teams, Web Apps, VPN Pivoting, Campaigns, AV Evasion, Custom Reports, More!)[2010-10-14] - 08:19:42 - Oracle patched my Java IE Plugin stack buffer overflow (goo.gl/iIwE) Blog/PoCs by @berendjanwever who came across the same bug (goo.gl/4Srk)[2010-09-19] - 13:14:11 - RT @reversemode: My latest 0day Apple QuickTime _Marshaled_pUnk backdoor param arbitrary code execution http://is.gd/eLDvG[2010-07-13] - 00:43:36 - RT @egyp7: Metasploit 3.4.1-release now available at http://www.metasploit.com/framework/download/[2010-07-07] - 01:42:26 - Finished coding up a solaris based heap overflow PoC, turned out to be pretty easy (and reliable) woohoo :)[2010-07-01] - 22:05:56 - Finally got windows kernel debuggin working in vmware. good tutorial (http://url.ie/1b6d)[2010-06-30] - 06:48:39 - JD-GUI rocks! geat quick java decompiler (http://url.ie/1cz9)[2010-06-28] - 15:30:50 - Just pre ordered The Rootkit Arsenal (http://url.ie/1gc1), looks interesting (http://url.ie/1gc3)[2010-06-25] - 07:19:01 - iDefense have published my TIBCO SmartSockets vuln (http://is.gd/vdHz), go stack buffer overflows in 2009![2010-06-04] - 19:25:42 - RT @reversemode OllyDbg 2 is in the house http://www.ollydbg.de/version2.html[2010-05-23] - 18:05:19 - Looks like that Adobe bug was the same as the Intevydis VulnDisco one (http://bit.ly/2FFBc8) -- fixed link :)[2010-05-22] - 13:33:32 - RT @WTFuzz: I just wrote a (rather lengthy) blog post on a few java vulnerabilities, patched in java 1.6.19. http://bit.ly/dobflO Feel f ...[2010-04-22] - 22:08:13 - RT @hdmoore: Approaching Metasploit 3.4.0 and Metasploit Express: http://blog.metasploit.com/2010/04/approaching-metasploit-340-and.html[2010-04-06] - 23:31:53 - ZDI have published my Java readMabCurveData bug (http://bit.ly/cYbHrL) (http://bit.ly/agMGhp), interesting stack buffer overflow![2010-04-01] - 03:01:54 - RT @WTFuzz: Some details about the techniques I used in todays pwn2own IE8 exploit: http://bit.ly/bBHOYO[2010-03-11] - 01:32:56 - RT @Trancer00t Metasploit exploit module for the new MSIE 0day vuln http://bit.ly/9u97FW[2010-03-04] - 09:20:27 - RT @mubix The Tao of Buffer Overflow - as taught by @Dildog - http://bit.ly/9OSMTV -- cool blast from the past :)[2010-01-10] - 18:18:43 - SkyLined has released his Alpha3 shellcode encoder system (http://code.google.com/p/alpha3/), sweet! :)[2010-01-01] - 01:01:42 - http://twitpic.com/w1yee - coding some webcam stuff ...with glitch results! :)[2009-11-17] - 20:49:20 - RT @hdmoore Metasploit Framework 3.3 Released! Blog: http://blog.metasploit.com/ Downloads: http://bit.ly/12Hsfy[2009-11-11] - 02:03:49 - windows x64 meterpreter lives! (http://pastebin.com/m7a707704)[2009-10-29] - 19:58:47 - TippingPoint's ZDI has published my Hummingbird Service Stack Overflow bug (http://bit.ly/2x4YA0). EMC and OpenText products effected.[2009-10-22] - 10:57:17 - RT @hdmoore metasploit has been acquired by Rapid7: http://metasploit.com/ http://blog.metasploit.com http://bit.ly/2c0Cac[2009-10-19] - 16:14:28 - Nice writeup by Fortinet on exploiting the recent pdf 0day (http://bit.ly/2cE2vZ)[2009-10-19] - 03:36:19 - New blog post about retrieving kernel32's base address for Windows7 (rc1) (http://is.gd/16swO)[2009-10-19] - 03:36:19 - Panda Security's Reverse Engineering challenge starts July 7th (http://url.ie/1yjw), hope its as fun as the f-secure one allways is[2009-10-19] - 03:36:19 - TippingPoint's ZDI has published my Novell Privileged User Manager bug (http://bit.ly/16M6A2). Pre auth remote DLL injection ftw![2009-10-19] - 03:36:19 - iDefense have just published my Akamai Download Manager vuln (http://bit.ly/19Ky2V), more stack overflow madness![2009-10-19] - 03:36:19 - @DidierStevens I cant get it to trigger, however the html page that loads the pdf/swf has some interesting shellcode so maybe its real[2009-10-19] - 03:36:19 - Cool, John McDonald's Heap Cache Exploitation paper published (http://bit.ly/1Sci92), digging into it now, looks great![2009-10-19] - 03:36:19 - New blog post Calling API Functions (http://bit.ly/1sntMq) ...Win32 and Win64 shellcode fun![2009-10-19] - 03:36:19 - w00t! I just joined the metasploit development team :)[2009-10-19] - 03:36:19 - windows x64 meterpreter lives! (http://pastebin.com/m7a707704)
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|