Saurabh Chaudhary  

@4w4r44

Chapter Lead Null & Owasp Security, Malware & Reverse Engineering ,Send me Malware

Vrijeme pridruživanja: veljača 2012.

Tweetovi

Blokirali ste korisnika/cu @4w4r44

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @4w4r44

  1. Poništi
  2. proslijedio/la je Tweet
    prije 4 sata
    Poništi
  3. 4. velj

    Last month found a nice trojan in the wild. It had a very low detection rate,But the author is anathor dumb asking 3000 US$ to decrypt. I traced him out.

    Poništi
  4. proslijedio/la je Tweet
    3. velj
    , , i još njih 3
    Poništi
  5. proslijedio/la je Tweet

    This abomination is the regex for validating IPv6 addresses:

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    For all you cryptography nerds out there. I’ve very much enjoyed playing around with this project. GitHub - NationalSecurityAgency/enigma-simulator: An educational demonstration of breaking the Enigma machine

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  8. proslijedio/la je Tweet
    1. velj

    When you are unpacking malware and the payload gets surprised.

    Poništi
  9. proslijedio/la je Tweet
    31. sij
    Poništi
  10. proslijedio/la je Tweet
    1. velj

    Cutter v1.10.1 released! 🥳 Tomorrow, GitHub will capture and store every repository in an archival facility deep in an Arctic mountain. 🥶🗻 Today, we release a special edition for the benefit of future mankind and other beings 👽 Get it @ Highlights >>

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    31. sij

    CryptoLocker MAKOP. Ransomware for rent. Партнёрская программа по криптолокеру MAKOP - RaaS. Here we go again!! 😅🤪🤭

    Poništi
  12. proslijedio/la je Tweet
    27. sij

    New: leaked documents, data, contracts show how hugely popular antivirus Avast now harvests internet browsing data and sells it for millions of dollars. Clients included Home Depot, Google, Microsoft. Documents show a product called "All Clicks Feed"

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    27. sij

    A massive cyber espionage campaign, which we found so spooked US intelligence that it changed how the government handles DNS registration, was the work of hackers aligned with the Turkish government

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    27. sij

    We are going to launch CTF in collaboration with on 1st February 2020 from 12 p.m which will be live for 24 hours. To participate in the CTF, register at: Winner gets the Xbox !!

    Poništi
  16. proslijedio/la je Tweet
    26. sij
    Poništi
  17. proslijedio/la je Tweet
    26. sij

    To find Satan sometimes start with Murphy. In 2007 I became an exploit failure engineer to find 0-days from studying reliability problems. Ep 57 has the story. 📊 🎙️

    Poništi
  18. proslijedio/la je Tweet
    26. sij

    👾🆕 🔥 -2019-19781 Exploitation 🔦Cfg: 1⃣reg_key: Disables Windows Defender/Protection 2⃣cmd_shadow|boot|recovery|firewall 3⃣no_name* Unix Setup 4⃣except_language - Anti-CIS🌐+ China🇨🇳 via h/t

    Poništi
  19. proslijedio/la je Tweet
    25. sij
    Poništi
  20. proslijedio/la je Tweet
    26. sij

    AV stands for: Additional Vulnerabilities

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·