Jamie Shaw

@5ub34x

Red Team | Adversary Simulation | MDSec | ActiveBreach | CCSAS & CCT | Mod on /r/redteamsec

lsass.exe
Vrijeme pridruživanja: siječanj 2012.

Tweetovi

Blokirali ste korisnika/cu @5ub34x

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @5ub34x

  1. proslijedio/la je Tweet
    prije 13 sati

    We are hosting a webinar on Tuesday, February 11th to release 3.0 and discuss some of the new attack primitives being introduced. and will be talking through the update. Sign up here:

    Poništi
  2. proslijedio/la je Tweet
    5. velj
    Poništi
  3. proslijedio/la je Tweet
    5. velj

    UPDATED 🚨 Advance your skills! ✔️ Expanded breach scenario (new flag 🚩) ✔️ New phishing techniques ✔️ Password scheme update ✔️ Windows & Defender updates R U Ready? 🙃 Sign up today:

    Poništi
  4. proslijedio/la je Tweet

    Also coming soon: Process Explorer dark mode

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    Come join me, , and as we "do it live", bypassing Twitch's TwitchGuard multi-authentication at 1PM EST. Will be recorded.

    Poništi
  6. proslijedio/la je Tweet
    4. velj

    Very useful tool if you are studying Drivers. Also really enjoyed the book: Windows Kernel Programming

    Poništi
  7. proslijedio/la je Tweet
    2. velj
    Poništi
  8. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Pushed a new Rubeus release after getting some additional feedback from our most recent AT:RTO students. The full changes are detailed here . To highlight a few new features- "/nowrap" globally prevents base64 blobs from line-wrapping, (1/4)

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    31. sij
    Poništi
  11. proslijedio/la je Tweet
    30. sij
    Poništi
  12. proslijedio/la je Tweet
    30. sij
    Poništi
  13. proslijedio/la je Tweet
    30. sij

    The first speaker on tonight’s team research night is detailing how to bypass Cylance using syscalls for API unhooking

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    A machine a day keeps the doctor away 🍏 Fatty will go live Feb 1 2020 at 19:00:00 UTC. RE will be retired! You still have time to hack your way in at

    Poništi
  15. proslijedio/la je Tweet
    29. sij

    Our discord has grown to over 250 users in just a few days! We'll be streaming again Thursday at 1PM EST. Topic: "Phishing in 2020". Join and I at

    Poništi
  16. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    28. sij

    ICYMI - released MoveKit and StayKit, a collection of aggressor scripts, .NET projects, and templates to enhance lateral movement and persistence on your engagements. Link: MoveKit: StayKit:

    Poništi
  18. proslijedio/la je Tweet
    28. sij

    Kali 2020.1 is up for download! Big changes yet again, with non-root user by default, a single installer image for multiple desktop enviroments, updates to themes, and more! Not to mention Rootless NetHunter!

    Poništi
  19. proslijedio/la je Tweet
    18. sij

    Beta of 2.8 available here: Key new features: -light & fast permission analysis à la Bloodhound -assess audit policy Check it and submit your feedback ASAP before code freeze next week Anyone can participate (and even fix my spelling mistakes!)

    Poništi
  20. proslijedio/la je Tweet
    27. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·