Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @0xBADCA7
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xBADCA7
-
netcat proslijedio/la je Tweet
Windows 10 UAC bypass for all executable files which are autoelevate true.https://github.com/sailay1996/UAC_Bypass_In_The_Wild …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
Someone dropped a PHP zero-day on GitHub. Talked to the PHP team last night. Bug requires local foothold to exploit, so not usable for remote attacks. Also, this is the second exploit for this "disable_functions bypass" in the last few months. https://github.com/mm0r1/exploits/tree/master/php7-backtrace-bypass …pic.twitter.com/MAWD8FpBRx
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
netcat proslijedio/la je Tweet
Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers,
@HackingThings and@jessemichael show that high speed DMA attacks can bypass hardware protections on enterprise devices. http://bit.ly/313EEqN pic.twitter.com/OWhEux8F78
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
[Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
We now have a way to play with target java objects from FridaAndroidInjector. The agent will load a dex with the java interfaces you've coded. Checkout the example in the repo:https://github.com/iGio90/FridaAndroidInjector …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
We told you our new XSS labs were difficult. No one has managed to solve them all yet. https://portswigger.net/web-security/hall-of-fame/cross-site-scripting …https://twitter.com/WebSecAcademy/status/1221811235672535040 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
Windows Kernel Information Disclosure Vulnerability , PoC for the SWAPGS attack (CVE-2019-1125)https://github.com/bitdefender/swapgs-attack-poc …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
Can't wait to present the progress we've made since
#BHEU at@offensive_con! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.#offensiveconpic.twitter.com/xfEaCdgraH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
Interested in learning Windows Kernel exploitation ?
@Synacktiv wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member. https://www.root-me.org/en/breve/New-set-of-challenges-in-Microsoft-Windows-kernel …pic.twitter.com/q8oSwfd5cC
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
netcat proslijedio/la je Tweet
How a double-free bug in WhatsApp turns to RCE https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/ …pic.twitter.com/4xlPrtx0XF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:https://github.com/Microsoft/ApplicationInspector/wiki …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
HTTP Request Smuggler now supports overriding the request method!
@eur0pa_ spotted that using an alternative method like DELETE can sometimes let you exploit otherwise-secure targets. (If you accidentally delete someone's homepage, that's on your head!)https://github.com/PortSwigger/http-request-smuggler …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
PoC (Denial-of-Service) for CVE-2020-0609 & CVE-2020-0610 Please use for research and educational purpose only. https://github.com/ollypwn/BlueGate …pic.twitter.com/R43AHUwGV0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
CVE-2020-0609 & CVE-2020-0610 Before / After patch Pseudo-codepic.twitter.com/ev79YH5SUH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
tl;dr: if you live in california, it is now illegal for an org to hire you as an infosec consultant to help on a gig for a week or two. youll have to LLC up and do it b2b to comply with this law. thanks, asshats. you broke the infosec consulting market in california.pic.twitter.com/03jZwgf9FC
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je Tweet
A little more than 15 hours remaining ! Current leaders: 1 - More Smoked Leet Chicken 2 - 0daysober 3 - perfect bluepic.twitter.com/rbcA5AVaEy
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
netcat proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
netcat proslijedio/la je Tweet
How to determine the cost of an attack objectively? One possibility is to follow the methodology proposed by the JHAS group, namely the Application of Attack Potential to Smartcards and Similar Devices. Read more and access the tool we created on our blog:https://www.riscure.com/blog/how-to-determine-the-cost-of-an-attack-objectively/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.