Only Another User

@0nly0n3p3rs0n

Independent Security Researcher.

Vrijeme pridruživanja: travanj 2014.

Tweetovi

Blokirali ste korisnika/cu @0nly0n3p3rs0n

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0nly0n3p3rs0n

  1. proslijedio/la je Tweet
    4. velj
    Poništi
  2. proslijedio/la je Tweet
    4. velj
    Poništi
  3. proslijedio/la je Tweet
    4. velj

    targets 🇮🇹 from VBA > WMIC > DLL "info_02_04.doc" hxxp://bghqyf1.com/cdjq/4oslx.php?l=dsi4.cab c2: kuu15austin21.]com qryyueeriberto.]com v15zxnapoleonln.]com v214.111 [10291029JSJUYNHG]

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    4. velj

    WhatTheHack - A Collection Of Challenge Based Hack-A-Thons Including Student Guide, Proctor Guide, Lecture Presentations, Sample/Instructional Code And Templates

    Poništi
  5. proslijedio/la je Tweet
    4. velj
    Poništi
  6. proslijedio/la je Tweet
    4. velj

    x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 Often AVs rely on simple signatures to detect malicious software and I needed a tool in order to confirm this behavior and be able to produce a working bypass. That’s why I wrote x0rro.

    Poništi
  7. proslijedio/la je Tweet
    4. velj
    Poništi
  8. proslijedio/la je Tweet
    4. velj

    detect the version of the target SSH server: msf > use auxiliary/scanner/ssh/ssh_version msf auxiliary(ssh_version) > set RHOSTS xx.xx.xx.xx/24 msf auxiliary(ssh_version) > set THREADS 256 msf auxiliary(ssh_version) > run

    Poništi
  9. proslijedio/la je Tweet

    Twitter warns hackers exploited an API bug on its platform to inappropriately match and learn linked phone numbers of millions of users. Based on IP addresses engaged in the attack, believes some of them may have ties to state-sponsored actors.

    Poništi
  10. proslijedio/la je Tweet
    4. velj

    How to disable your "off-facebook activity" i.e. the data collects about you from other websites. More:

    Poništi
  11. proslijedio/la je Tweet
    3. velj
    Poništi
  12. 3. velj
    Poništi
  13. 3. velj
    Poništi
  14. proslijedio/la je Tweet
    3. velj

    You have to live dangerously: don’t do your search on Google, do it on the Google search of the NSA 😅🤪🤔

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    3. velj

    awareness campaign in full swing

    Poništi
  16. proslijedio/la je Tweet
    1. velj

    18 Emotet malware urls hosted by some of these have been up for 1 to 2 weeks. cc

    Poništi
  17. proslijedio/la je Tweet

    Yet Another Sudo ! When 'pwfeedback' is enabled, a new Sudo bug could let low privileged & users (or malicious programs) execute arbitrary commands with 'root' privileges. Details for CVE-2019-18634 ➤

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    2. velj

    . 🇺🇸 🇨🇳 🇦🇹🇧🇷🇨🇦🇨🇭🇨🇱🇩🇪 🇩🇰 🇪🇬 🇫🇷🇬🇷 🇭🇰 🇮🇱 🇮🇪🇮🇳 🇯🇵 🇰🇷 🇱🇹🇳🇴 🇳🇬🇵🇪 🇵🇰🇵🇱🇵🇹🇷🇺 🇸🇪 🇸🇻 🇹🇷🇺🇬 🇧🇴 🇿🇼 🇧🇸🇧🇹 🇧🇻 🇨🇺 🇪🇸🇬🇧 🇬🇹🇭🇷🇻🇳🇮🇩🇮🇷🇯🇲 🇮🇹 🇸🇩 binds the world together

    Poništi
  19. proslijedio/la je Tweet
    3. velj

    Hackers have starting putting their tutorials on PornHub, and I’m the person who approves web security exceptions for the Red Team. I am not looking forward to this world.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    3. velj

    My Hacking Channel is now LIVE! Check out my first video (the USB-C one) and get ready for much more! I will be putting my streaming archives here from now on. :)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·