daviddiaul Profile Banner
diaul@infosec.exchange Profile

@daviddiaul

Followers
876
Following
2K
Media
65
Statuses
1K

Security Guy. All posts are my own and do not represent the opinions of my employer etc. @[email protected]

Joined April 2009
Don't wanna be here? Send us removal request.
@hexacon_fr
Hexacon
16 days
Since the beginning of Hexacon, @TrenchantARC has been a sponsor of the event and this year is no exception! Trenchant is specialized in offensive security, counting many respected researchers within their ranks. Come and meet them!
Tweet media one
0
2
8
@TrenchantARC
Trenchant
17 days
If you didn't get a chance to grab the latest 40 year anniversary edition of @phrack, here's our small addition to an epic publication, congratulations on 40 years! Also make sure to have a read of 'MMIO in the Middle' in linenoise section of issue Ox48 by our very own @b1ack0wl
Tweet media one
1
6
39
@TrenchantARC
Trenchant
4 months
We had an incredible time in Berlin @offensivecon - Always awesome to see such epic talks and be a part of a community pushing the boundaries of offensive security. The Trenchant team also wants to extend a huge thanks to the organizers @binarygecko for such a great con !
Tweet media one
0
2
17
@TrenchantARC
Trenchant
4 months
Amazing talk from our browser wizards @grubburggrub @0xrac !!! 🪄🪄🪄
Tweet media one
2
10
46
@0x4a47
Jimmy
4 months
Hey @offensive_con, Trenchant has a challenge for you, be the first to solve during the conference and you get a pretty epic prize - come find one of us if you solve it !!
Tweet media one
0
5
17
Hey guys 👋 I’m at @offensive_con and I’m hiring: I’m looking for skilled individuals that have deep knowledge in mobile user space heap allocators. Ping me if you see me around #OffensiveCon #berlin
0
6
33
@IamActuallyLvL1
Justin 'IamActuallyLvL1' Gennari
7 months
Magic is a game of choices and probability. You can make a correct choice and lose. You can make an incorrect choice and still win. The key to being great is by putting yourself in the best position to be lucky.
4
19
243
@alexjplaskett
Alex Plaskett
7 months
Vulnerability research is a marathon, not a sprint. Many start out strong but can't keep up the motivation when the going gets tough and the bugs are not flowing. Don't rush it. Be consistent. Keep your pace. You'll get there.
5
43
217
@nostarch
No Starch Press
7 months
FYI, the best security researchers weren't made in corporate training rooms. They were forged by curiosity, open resources, and community-driven knowledge. If you're here for that energy then come on down!
15
169
1K
@TheHumanoidHub
The Humanoid Hub
9 months
New video of Clone Torso, demonstrating biomimicry of complex, natural motions of human shoulders.
145
521
3K
@naehrdine
Jiska
9 months
Want to learn iOS reverse engineering? Let's explore user space apps and daemons, discover and fix bugs with automated fuzzing, dive into kernel&firmware internals, and explore forensics. My next training will be at @REverseConf end of February! https://t.co/VJGqhG2S4h
Tweet media one
0
25
145
I’m at Black Hat Europe in London! Ping me if you are around here #BHEU
Tweet media one
0
1
6
@thatjiaozi
那个火饺🦆(JJ)
11 months
Fuzzing is so easy to setup. And so hard to get it right
1
1
10
North Yorkshire Council To Ban Apostrophes On Street Signs To Avoid Database Problems. #littlebobbytables
Tweet media one
0
1
7
@PentesterLab
PentesterLab
1 year
We would like to welcome our new team member: Jia Tan! Jia will work on a set of challenges for our "Supply Chain" badge!!
14
38
342
@davepl1968
Dave W Plummer
1 year
I wrote this Format dialog back on a rainy Thursday morning at Microsoft in late 1994, I think it was. We were porting the bajillion lines of code from the Windows95 user interface over to NT, and Format was just one of those areas where WindowsNT was different enough from
Tweet media one
608
4K
27K
@steventseeley
ϻг_ϻε
1 year
What if the vulnerabilities we discovered in software were just a reflection of the vulnerabilities within us?
9
8
53
@nSinusR
nSinus-R (@[email protected])
2 years
Interested in low-level hacking, embedded systems, and trusted execution environments? We currently have a PhD opening, feel free to reach out for more information! Application deadline: April 1st 2024.
1
18
24
@andreyknvl
Andrey Konovalov
2 years
Wrote an article about turning a ThinkPad X1 Carbon 6th Gen laptop into a programmable USB device by enabling the xDCI controller 😯 Now I can emulate USB devices from the laptop without external hardware, including via Raw Gadget or even Facedancer 😁 https://t.co/B46Su8Wu9C
Tweet card summary image
xairy.io
Enabling and using xDCI controller on ThinkPad X1 Carbon 6th Gen
8
180
608