rvrsh3ll

@424f424f

Security Enthusiast, BMW ///M Lover, My opinions are my own, now give me your tears admin. Go IRISH!

Inside your computer
Vrijeme pridruživanja: svibanj 2013.

Tweetovi

Blokirali ste korisnika/cu @424f424f

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @424f424f

  1. proslijedio/la je Tweet
    prije 3 sata

    I made a PowerShell script when researching COM objects that has like 30 foreach and if loops and will search every COM object method for a keyword, e.g. finding COM objects with a method containing 'ExecuteShell'. Maybe someone else will find it useful.

    Poništi
  2. proslijedio/la je Tweet
    prije 6 sati

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  3. proslijedio/la je Tweet
    Poništi
  4. proslijedio/la je Tweet
    2. velj

    More red team wisdom from and red team ops book. If you’ve not bought it, I highly recommend it to better understand the process and programmatic aspects of red team engagements. Understanding the value to a business is more important than popping shells.

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    💵 2000 BITCASH GIVEAWAY 💵 No more messy blockchain addresses. Download the wallet and create yourself a unique nickname. Be sure to reply with your nickname. Winner Feb14 🌹 Like RT Follow Join Join

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet

    'Mess with the best, die like the rest'?

    Poništi
  7. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  8. 1. velj
    Poništi
  9. 1. velj

    I'm at lobbycon near the coffee shop. Come say hello!

    Poništi
  10. proslijedio/la je Tweet
    Poništi
  11. proslijedio/la je Tweet
    1. velj

    Load encrypted PE from XML Attribute. MSBuild is still the best.😅 MSBuild sets Property then calls Execute. Use this example to decouple payloads & prove that all security products have a "Single File Bias". Decouple payloads to subvert detection.

    Prikaži ovu nit
    Poništi
  12. 31. sij

    If you don't have a research folder, you're probably missing out on some great stuff.

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):

    Poništi
  14. 31. sij

    Anyone know of an open source version of CVE-2019-1388? All I have been able to find is this sketch binary.

    Poništi
  15. 31. sij

    Ok so i'm getting my conferences confused. I'll be at tomorrow. Hope to see/meet some awesome hackers

    Poništi
  16. 31. sij

    Next week, and I are going to demo live a bypass for "Twitchguard". A new type of multi-factor account for twitch access. (yes we responsibly disclosed) "Wont-fix" so we'll be doing it live on twitch about twitch :P

    Poništi
  17. proslijedio/la je Tweet
    Poništi
  18. proslijedio/la je Tweet
    30. sij

    Wow, long time coming Happy for the result, still not happy with how it was handled by authorities. And the winner in all this? Attorneys

    Poništi
  19. proslijedio/la je Tweet
    30. sij

    This stream is live now, if you are an attacker or defender there is a TON of great knowledge sharing going on by very experienced attackers. Get in here!

    Poništi
  20. proslijedio/la je Tweet
    30. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·