CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 3,393 개 / Lastupdate : 2018-01-24 18:50:25



pof Twitter


Telematics engineer, Linux sysadmin, developer, security enthusiast, open source advocate with a strong passion for Android devices and chiptune music lover. Barcelona · pof.eslack.org

RSS Articles : 3,393
URL : twitter.com/pof
RSS : CodeEngn Live RSS 엔진

Date Article
2018-01-20 12:00:13 jamais vu - a 1.0.0 TrustZone code execution exploit for the Nintendo Switch: https://www.reddit.com/r/SwitchHacks/comments/7rq0cu/jamais_vu_a_100_trustzone_code_execution_exploit/ …
2018-01-19 21:52:08 New wiki page with collection of video recording of osmocom related talks: https://osmocom.org/projects/cellular-infrastructure/wiki/Videos_of_Presentations …
2018-01-18 09:02:19 android-scripts - collection of Android Reverse Engineering scripts MobileSecurity AndroidSecurity by @timstrazz https://github.com/strazzere/android-scripts …
2018-01-18 05:44:40 Treble removed most device-driver access from system_server so the kernel attack surface available to system_server is significantly reduced. And, as @lingtongshen said, getting code execution in system_server is plenty bad even without kernel.
2018-01-18 04:55:03 The technical details of a working remote exploit for pixel, https://security.googleblog.com/2018/01/android-security-ecosystem-investments.html …, Thanks for the generous of Google, its a Pleasant cooperation with android security team,
2018-01-17 23:44:17 First remote exploit chain submitted to Android security rewards. Nice job @oldfresher! https://android-developers.googleblog.com/2018/01/android-security-ecosystem-investments.html …
2018-01-17 23:00:06 Learn about the technical details of the Pixel phone exploit chain including a V8 engine bug and a bug in Androids libgralloc moduleRead our blog post here ↓ https://goo.gl/V1cK33
2018-01-17 16:14:51 New @Android advisory - priv esc via adb misconfiguration, CVE-2017-13212 found by @amarekano https://labs.mwrinfosecurity.com/advisories/privilege-escalation-via-adbd-misconfiguration …
2018-01-16 23:46:12 Version 10 (latest, for Windows 10, 7, down to Vista): https://github.com/xspr/trust/releases … new features, 日本語も, shout outs to @pof and @TheRealPasky
2018-01-16 23:38:26 If youre looking for an advanced program that lets you control dummy options and save states to practice things like reversal timing, wakeup options, defensive options, and safe meaty setups, theres TRUST developed by @XSPR_DARU https://www.strevival.com/strategy/trust/
2018-01-16 23:36:49 So for those of you looking for some sort of training mode ROM in ST, here it is. Fairly easy to setup and is great for practicing combos, tick throws, and other offensive setups http://pof.eslack.org/2014/04/22/ssf2t-the-quest-for-the-perfect-training-mode/ …
2018-01-16 02:02:15 In case it wasnt obvious, our Switch coldboot exploit:* Is a bootrom bug* Cant be patched (in currently released Switches)* Doesnt require a modchip to pull off https://twitter.com/fail0verflow/status/950003287062974465 …
2018-01-15 18:21:24 These are our current requirements for 2018: https://gist.github.com/thestinger/f200d63805c0d07c2ec966904a167467 …. Not aware of options other than the Pixel 2 with even verified boot without rollback protection / direct key enforcement. Most are ruled out by lack of security updates for firmware or even the open components.
2018-01-15 07:40:20 Unofficial Android Auto SDK. Finally we might see some app innovation on AA, even if only in developer mode! https://github.com/martoreto/aauto-sdk/blob/master/README.md …
2018-01-13 16:38:15 A Masters thesis about ANSI art. Like City Lights, Receding: ANSi Artwork and the Digital Underground, 1985-2000 https://spectrum.library.concordia.ca/7341/1/Hargadon_MA_S2011.pdf …pic.twitter.com/m1QSVQvhyn
2018-01-12 03:44:55 As @collinrm and @ikoz recently presented as well ( https://www.mulliner.org/collin/publications/eu-17-Mulliner-Kozyrakis-Inside-Androids-SafetyNet-Attestation.pdf …), hardware attestation is the game changer. Try e.g. with https://github.com/divegeek/AttestationExample … by @shawnwillden to verify boot state from outside of (potentially tampered with root hiding) Android runtime.
2018-01-12 00:49:10 Documentation on using AVB (Android Verified Boot 2.0) on the Pixel 2 landed with some modifications: https://twitter.com/CopperheadOS/status/949791020455149568 …https://android.googlesource.com/platform/external/avb/ device-specific-notes …No longer need to find the flash handler for fastboot flash avb_custom_key in the bootloader disassembly to make use of it...
2018-01-10 18:12:37 Android: Hardware Service Manager Arbitrary Service Replacement due to getpidcon https://bugs.chromium.org/p/project-zero/issues/detail?id=1404 …
2018-01-06 21:34:14 Improved the IDA Pro loader for Nintendo Switch binaries switch reversingIDA 7.0 supportNSO file supportARM64 decompiler supportSymbol recovering https://github.com/pgarba/SwitchIDAProLoader/blob/master/Switch64_70.dll.xz …pic.twitter.com/TGIqcRenIR
2017-10-11 19:35:57 Identifying / Avoiding Android app Protections - Talk by @timstrazz @Bugcrowd LevelUp 2017 https://www.youtube.com/watch?v=MH1gQLDxx2w/index=15/list=PLIK9nm3mu-S5InvR-myOS7hnae8w4EPFV/t=43s …

Linode is a privately owned virtual private server provider based in Galloway, New Jerse