Tweetovi

Blokirali ste korisnika/cu @0xrb

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xrb

  1. proslijedio/la je Tweet
    prije 15 sati

    DoublePulsar について良く知られた SMB インプラントではなく隠された機能 RDP インプラントについての詳細分析記事で、とても良いです👍 DOUBLEPULSAR RCE 2: An RDP Story

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    4. velj

    T-Pot's NextGen edition will provide you a first peek into what's coming next, just run the update script

    Poništi
  3. proslijedio/la je Tweet
    4. velj
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    3. velj
    Poništi
  5. proslijedio/la je Tweet
    3. velj
    Poništi
  6. proslijedio/la je Tweet
    3. velj

    Top networks with the highest amount of new malware distribution sites in January 2020: #1 2,786 URLs AS4837 CHINA169-BACKBONE 🇨🇳 #2 2,479 URLs AS4134 CHINANET-BACKBONE 🇨🇳 #3 2,196 URLs AS15169 GOOGLE 🇺🇸 Source:

    Poništi
  7. 3. velj
    , , i još njih 3
    Poništi
  8. 3. velj

    .Linux 𝗜𝗣: 217.182.38.147 Payload 𝗟𝗜𝗡𝗞: hxxp://217.182.38.147/GhOul.sh CnC Port: TCP/1111 𝗪𝗛𝗢𝗜𝗦: Country: FR / Currently 𝗔𝗰𝘁𝗶𝘃e

    , , i još njih 5
    Poništi
  9. proslijedio/la je Tweet
    3. velj
    Poništi
  10. 3. velj

    again in the wild Threat Actor : Evolution's International Hack team Payload 𝗟𝗜𝗡𝗞: hxxp://37.49.231.190/kc-botnet/x86_64 𝗪𝗛𝗢𝗜𝗦: NL / ASN: AS209299 VITOX-TELECOM Currently 𝗔𝗰𝘁𝗶𝘃𝗲 cc:

    Poništi
  11. proslijedio/la je Tweet
    2. velj

    Think I forgot this one the other day: Top Iranian Attacking IPs

    Poništi
  12. proslijedio/la je Tweet
    1. sij

    Tracker is now publicly available! It's centralizing AZORult C2 panels and monitoring them for threat hunting and statistics purpose 🦅 Happy hunting!

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    Someone dropped a PHP zero-day on GitHub. Talked to the PHP team last night. Bug requires local foothold to exploit, so not usable for remote attacks. Also, this is the second exploit for this "disable_functions bypass" in the last few months.

    Poništi
  14. proslijedio/la je Tweet
    28. sij

    Here's my PoC for CVE-2020-7980, a script to gain RCE (root level) to some Satellite controllers.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    29. sij

    Introducing my newest project: I got phished The goal is to notify IT-security representatives about phishing victims within their constituency 📨 👉 A big thanks to who initiated the project! 👏 For bug reports and feature requests -> DM me

    Poništi
  16. proslijedio/la je Tweet
    28. sij

    The 360 Alpha team helped Apple to fix 0-click RCE & memory leak bugs in CoreBluetooth, which could allow attackers near by to remote control any Mac systems with zero interaction.

    Poništi
  17. proslijedio/la je Tweet
    29. sij

    First GandCrab Team .. 🦀🦀 Now Maze Team .. 💀💀 Why are ransomware developers hate me?🥺🥺🥺 I'm a good guy 😇😇😇

    Poništi
  18. proslijedio/la je Tweet
    28. sij

    Some new Maze strings... About first line: isn't from Poland. Or there is another Kremez? Also, guess you have to talk with 's husband about this matter, no? 😂 Second: what's the problem with ? 🤔 Third: Now this is a threat to Southwire? 🤔

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    28. sij
    Poništi
  20. proslijedio/la je Tweet

    CentOS Web Panel ( 0.9.8.836 - 0.9.8.847) vulnerabilites CVE-2019-13360 - User panel bypass Login #1 CVE-2019-13605 - User panel bypass Login #2 ...  …

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·