Tweetovi

Blokirali ste korisnika/cu @7ustry

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @7ustry

  1. proslijedio/la je Tweet
    prije 24 sata
    Poništi
  2. proslijedio/la je Tweet
    prije 22 sata

    Need a Reference Architecture? Check out this one showing how technology enables this strategy/access model. Slide 14 of CISO Workshop Module 3

    Poništi
  3. proslijedio/la je Tweet
    prije 8 sati

    Analysis of a triple-encrypted AZORult downloader

    Poništi
  4. proslijedio/la je Tweet
    prije 8 sati

    Creating payloads without "'`()[]\%; by ... that's useful...

    Poništi
  5. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  7. proslijedio/la je Tweet
    31. sij

    Just released a quick tool, wordlistgen, I put together for taking a list of URLs/paths from stdin and parsing components (subdomains, paths, query strings & values) to easily/quickly make contextual content discovery wordlists for

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    prije 24 sata

    website-checks 1.18.0 released * more stable * improved error handling * Docker support (thanks Isaak) * better testing (GHA) * retry failed requests * new ssldecoder instance Get it at

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  10. proslijedio/la je Tweet
    31. sij
    Poništi
  11. proslijedio/la je Tweet
    1. velj

    Hardware Debugging for Reverse Engineers (Part 1) : SWD, OpenOCD and Xbox One Controllers : cc

    Poništi
  12. proslijedio/la je Tweet
    31. sij

    PHP 0day : PHP 7.0-7.4 disable_functions bypass : Some more Exploits :

    Poništi
  13. proslijedio/la je Tweet
    29. sij

    1\ I've written a little compiler to ship ML models as standalone Yara rules, and done proof of concept detectors for Macho-O, RTF files, and powershell scripts. So far I have decision trees, random forests, and logistic regression (LR) working.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    30. sij
    Poništi
  15. proslijedio/la je Tweet
    11. pro 2019.

    Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing

    Poništi
  16. proslijedio/la je Tweet
    19. pro 2019.

    Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): Hoping to spread the RE fever :)

    Poništi
  17. proslijedio/la je Tweet
    10. sij

    Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics)

    Poništi
  18. proslijedio/la je Tweet
    15. stu 2019.

    Awesome-AFL : A curated list of different AFL forks and AFL inspired with detailed equivalent academic papers with AFL-fuzzing tutorials

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    27. sij

    Flamingo is a new open source tool from for capturing credentials sprayed by IT and security products: (h/t to for HTTP NTLM support!)

    Poništi
  20. proslijedio/la je Tweet
    25. sij

    Manul: coverage-guided parallel fuzzer for open-source and blackbox binaries

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·