0xdeadbeefJERKY  

@0xdeadbeefJERKY

Red Team @ FB. Windows enthusiast. Lifelong metalhead. VSCode advocate.

Vrijeme pridruživanja: kolovoz 2016.

Tweetovi

Blokirali ste korisnika/cu @0xdeadbeefJERKY

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xdeadbeefJERKY

  1. Prikvačeni tweet

    The slides for my presentation on at Open Forum event hosted by are now available on GitHub -

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Google loves security keys, and today announced an open source implementation to help spur further innovation from the security research community 1/ .

    Prikaži ovu nit
    Poništi
  3. Periodically, I become overwhelmed by the volume of stuff that I want to learn more about, research, test, dig into. It's only natural in this industry, but it's a great reminder to exercise your ability to hone your focus and prioritize your work. All the while avoiding burnout.

    Poništi
  4. proslijedio/la je Tweet
    28. sij

    I'm looking for a new role doing something AppSec/Red Team/OSINT related in Seattle or remote. My strong suite is web and mobile security, with lots of bug bounty experience. My resume and contact info are on , DMs open as well. RT's are much appreciated.

    Poništi
  5. I just finished a successful playthrough of and, ironically, I'm sweating bullets. What a well made game. Engaging from start to finish.

    Poništi
  6. Poništi
  7. proslijedio/la je Tweet
    18. sij

    The privacy paranoid among us have long worried that all of our online photos would be scraped to create a universal face recognition app. My friends, it happened and it’s here:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    17. sij

    Live now: BadBlood an Active Directory Object Creator and Security Generator

    Poništi
  9. Finally finished 's and it did not disappoint. I highly recommend it to both those in the industry and those that are not. It really drives home the gravity of geopolitically driven cyber warfare and how it's evolved over the years.

    Poništi
  10. proslijedio/la je Tweet
    15. sij
    Poništi
  11. For those considering 's Windows Internals training, I attended the course last year and wrote up a quick review here -

    Poništi
  12. Poništi
  13. Insightful research showing how effective homograph attacks can be against the most popular email clients when repurposed for phishing efforts.

    Poništi
  14. proslijedio/la je Tweet
    5. sij

    Retweet if you *also* don't have any CVE's but are still a valued member of the infosec community. 🖤

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    28. pro 2019.

    Just published some thoughts on red teaming, how to approach it, procure it and get in to it...

    Poništi
  16. Finally getting around to

    Poništi
  17. proslijedio/la je Tweet
    16. pro 2019.

    Here is part one. Pretty sure the attack surface described has many more bugs (not just the vmware tools installer.. I doubt this bug is exploitable in the first place, just wanted something to demo that is unpatched, easier for folks to learn!)

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    8. pro 2019.
    Poništi
  19. proslijedio/la je Tweet
    3. pro 2019.

    🔥👾 (finally) a macOS implant that support direct in-memory execution of remote payloads! New blog post: "Lazarus Group Goes 'Fileless' H/T

    Poništi
  20. proslijedio/la je Tweet
    3. pro 2019.

    Today I'm releasing a novel DNS covert channel implant. Everything is done over encoded AAAA requests (hostnames) and responses (IPv6 addresses) so it evades existing DNS detections. Low bandwidth, 100% Python3 with no dependencies, run it anywhere

    Poništi
  21. proslijedio/la je Tweet

    You’ve been waiting for it—our Black Friday Sale is here! What’s the discount? you ask. 42 is the answer. Use code ULTIMATE42 at checkout on for 42% off everything through Sunday, Dec. 1.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·