Master 32-bit shellcode at your own pace https://t.co/qLcp9Xg7Nm Code samples, exercise videos & mock certification exams included – Enroll Now! pic.twitter.com/Ymv4W3Fed2 — Pentester Academy (@SecurityTube) June 5, 2018...
Welcome to the Reverse Engineering open course! https://t.co/034UYJwaQk pic.twitter.com/L25QXuyiPA — MalwareHunterBR (@MalwareHunterBR) June 3, 2018...
Reversing an av engine to compose signatures capable of detecting classified documents : https://t.co/zyYsY4OQjt cc @patrickwardle 👍 pic.twitter.com/667NSAyR4a — Binni Shah (@binitamshah) January 8, 2018...
exploit me – very vulnerable ARM application (CTF style exploitation tutorial)#MobileSecurity by @viperbjk https://t.co/Iz5CT1QsvA — Mobile Security (@mobilesecurity_) January 2, 2018...
Using #Meltdown to steal passwords in real time #intelbug #kaiser #kpti /cc @mlqxyz @lavados @StefanMangard @yuvalyarom https://t.co/gX4CxfL1Ax pic.twitter.com/JbEvQSQraP — Michael Schwarz (@misc0110) January 4, 2018...