od86

@0d8x86

🇭🇺🇪🇺🇩🇰 software architect ▪ ex malware analyst 👽 BSc EE, MSc DME notepad++ he/him ➡️ open DMs

Copenhagen, Denmark
Vrijeme pridruživanja: listopad 2009.

Tweetovi

Blokirali ste korisnika/cu @0d8x86

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0d8x86

  1. Prikvačeni tweet
    31. sij

    Today’s realisation of getting old: I frowned like “wth is this, strange” once saw a CDROM.SYS entry in a forensic log. 💿

    Poništi
  2. prije 8 sati

    Google quietly ruined Chrome, and we almost missed it

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    The Developer Ecosystem Survey 2020 is live! Share your expertise with the professional coding community and you have a chance to win a prize!

    Poništi
  4. 4. velj

    Full chain exploit for CVE-2019-11708 & CVE-2019-9810

    Poništi
  5. 3. velj
    Poništi
  6. proslijedio/la je Tweet
    3. velj

    Tool / ressource of the day name: Bugcrowd University links: - - description: Modules with slides, videos and someti [cropped] Find out more on

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    Fun fact: That job screening company that scans Twitter accounts for bad words has developers that commit plaintext passwords on GitHub. ... Maybe they're scanning the wrong website.

    Prikaži ovu nit
    Poništi
  8. 3. velj
    Poništi
  9. 2. velj
    Poništi
  10. proslijedio/la je Tweet
    1. velj

    Cutter v1.10.1 released! 🥳 Tomorrow, GitHub will capture and store every repository in an archival facility deep in an Arctic mountain. 🥶🗻 Today, we release a special edition for the benefit of future mankind and other beings 👽 Get it @ Highlights >>

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  12. 1. velj
    Poništi
  13. proslijedio/la je Tweet
    30. sij

    I just installed a Firmware update on my Toothbrush. 🙄😬

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    in-memory traces of ppldump, exploiting zam64.sys vulndriver to dump lsass memory, cool stuff. sysmon will show a generic\noisy calltrace so detection chances here are low, if combined with lsass loading dbgcore.dll it may work.

    Poništi
  15. proslijedio/la je Tweet
    30. sij

    For the past few months, I've been diving into Apple's Endpoint Security Framework. This post shares how I use the framework for detection engineering purposes.

    Prikaži ovu nit
    Poništi
  16. 30. sij
    Poništi
  17. 30. sij
    Poništi
  18. proslijedio/la je Tweet

    Vulnerability we found in Zoom allowed attackers to eavesdrop on random conversations

    Poništi
  19. proslijedio/la je Tweet
    29. sij
    Poništi
  20. 30. sij

    Russian national, author of NeverQuest banking trojan, pleads guilty

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·