Tweetovi

Blokirali ste korisnika/cu @AlvaroBotas

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @AlvaroBotas

  1. proslijedio/la je Tweet
    5. velj

    Colegios y Universidades en EE.UU. están siendo víctimas de ¿esta preparado el sistema educativo español para combatir el cibercrimen? 🤔

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    CERT Japan has published a tool called EmoCheck that tells you if you've been infected with Emotet. Tool works by scanning for common process names used by Emotet.

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  4. proslijedio/la je Tweet
    26. sij
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    29. sij
    Poništi
  7. proslijedio/la je Tweet
    27. sij

    Given a Pcap File, plot a network diagram displaying hosts in the network, network traffic, highlight important traffic

    Poništi
  8. proslijedio/la je Tweet
    27. sij
    Poništi
  9. proslijedio/la je Tweet
    25. sij
    Poništi
  10. proslijedio/la je Tweet
    23. sij

    Which services do you find most often exploited by attackers in internal networks? (non-OS / application level) My list: 1. Tomcat with default creds 2. JBoss (JMX) 3. HP Data Protector / OmniBack

    Poništi
  11. proslijedio/la je Tweet
    21. sij

    PowerShell Obfuscation using SecureString : PowerShell : Convert to / From - SecureString decoder : cc

    Poništi
  12. proslijedio/la je Tweet
    21. sij

    Interested in the details of CVE-2020-0601/Curveball? I released a video on Friday going into the technical details of the Microsoft CryptoAPI vulnerability!

    Poništi
  13. proslijedio/la je Tweet
    16. sij

    Shellcode: In-Memory Execution of JavaScript, VBScript, JScript and XSL

    Poništi
  14. proslijedio/la je Tweet
    15. sij

    Ghidra Script that sets the names for missing function names by looking for relevant patterns in the binary! Hope that will help you too :)

    Poništi
  15. proslijedio/la je Tweet
    14. sij

    Reverse engineering course (Focuses on x64 Windows) : cc

    Poništi
  16. proslijedio/la je Tweet
    14. sij
    Poništi
  17. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    12. sij

    Heapinspect - Inspect Heap In Python

    Poništi
  19. proslijedio/la je Tweet
    11. sij

    Windows Process Injection in 2019 . Nice compilation with functional examples.

    Poništi
  20. proslijedio/la je Tweet
    10. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·