Similar User
@reconmtl
@harmj0y
@ret2systems
@Simone_Ferrini
@Zimperium
@radareorg
@0vercl0k
@5aelo
@ProteasWang
@0xcharlie
@i0n1c
@_argp
@quarkslab
@qiling_io
@marcograss
Do you want to prepare your employees for working on iOS and MacOS security topics? Then our Training Unlimited Promotion is the best way to prepare them via a comprehensive set of four training courses for a huge discount. antid0te.com/blog/22-01-13-…
We have just announced our new online training courses for the first 7 months of the year 2022. We will offer our four standard courses and one advanced course. antid0te.com/stories/traini…
Former trainees have requested a continuation of our iOS Kernel Exploitation Training course. In August 2022 we will finally offer an Advanced iOS Kernel Exploitation Training course for everyone who already has gathered prior knowledge in that field. antid0te.com/blog/22-08-22-…
Training Unlimited - for the next 4 weeks we will offer a special promotion that allows you to attend all 4-5 remaining training courses for the rest of the year for the price of 2.5 courses. antid0te.com/blog/21-07-27-…
iOS 13/14 Kernel Exploitation ONLINE Training Course - December 2020-12-07 for APAC Timezones 2020-12-14 for EU/NorthAmerica Timezones antid0te.com/blog/20-12-07-…
MacOS and iOS Kernel Internals For Security Researchers ONLINE Training Course - November 2020-11-09 for APAC Timezones 2020-11-16 for EU/NorthAmerica Timezones antid0te.com/blog/20-11-09-…
Will you be attending @offensive_con but none of the training courses fit your taste? We are offering another MacOS and iOS Kernel Internals for Security Researchers Training right after. Be one of the first to learn about DriverKit and EndpointSecurity antid0te.com/blog/20-02-17-…
The location of our upcoming trainings in Singapore has been announced. All three trainings will be in the Novotel Clarke Quay. All 3 trainings have free seats available and all 3 trainings offer group signup discounts. Please ask us and please retweet. antid0te.com/stories/traini…
People are asking me how real the threat is that someone will incorporate the iOS 12.4 jailbreak into a malicious AppStore app. Well let me just say that as far as I remember there was never before source code for a jailbreak publicly available before it was patched.
Want to get into Android Exploitation? Have a look at our ARM64 Reverse Engineering and Android/Linux Exploitation Training (October 2019) in Singapore antid0te.com/blog/19-10-07-…
Take home an ODROID-C2 and a Google Pixel 3A phone if you signup early for our ARM64 Reverse Engineering and Android/Linux Exploitation Training (October 2019) antid0te.com/blog/19-10-07-…
Have you ever wondered about how to exploit Apple's iMessage on iOS 12/13 then have a look at our Advanced iOS 12/13 Userspace Exploitation Training in Singapore antid0te.com/blog/19-11-04-…
We are updating our iOS Kernel Exploitation Training for iOS 13 and newest iOS devices. You can take it either in Singapore (October) antid0te.com/blog/19-10-21-… or in Berlin (November) antid0te.com/blog/19-11-25-…
We just updated the list of upcoming trainings - we now cover topics from basic ARM64 android exploitation to advanced iOS userland exploitation of e.g. iMessage. antid0te.com/stories/traini…
United States Trends
- 1. Wayne 103 B posts
- 2. #UFCMacau 31,7 B posts
- 3. Neil 25,1 B posts
- 4. Petr Yan 4.859 posts
- 5. Figgy 3.370 posts
- 6. #Arcane 442 B posts
- 7. Enzo 56,8 B posts
- 8. Good Saturday 30,1 B posts
- 9. Leicester 52,4 B posts
- 10. #saturdaymorning 4.062 posts
- 11. Game Day 35 B posts
- 12. #Caturday 5.238 posts
- 13. Madueke 16,2 B posts
- 14. #LEICHE 35,3 B posts
- 15. Surgeon General 66,6 B posts
- 16. Ekko 91,2 B posts
- 17. Ricci 2.939 posts
- 18. Chelsea 105 B posts
- 19. Palmer 33,8 B posts
- 20. Noni 8.252 posts
Who to follow
-
REcon
@reconmtl -
Will Schroeder
@harmj0y -
RET2 Systems
@ret2systems -
sferrini
@Simone_Ferrini -
Zimperium
@Zimperium -
radare
@radareorg -
Axel Souchet
@0vercl0k -
Samuel Groß
@5aelo -
Proteas
@ProteasWang -
Charlie Miller
@0xcharlie -
Stefan Esser
@i0n1c -
argp
@_argp -
quarkslab
@quarkslab -
Qiling Framework
@qiling_io -
Marco Grassi
@marcograss
Something went wrong.
Something went wrong.