Anastasis KingStyle

@Anastasis_King

PC Technician, Penetration Tester, Ethical Hacker, Cyber Security Expert, Malware Analyst, Information Security Researcher, Reverse engineering

Thessaloniki
Vrijeme pridruživanja: veljača 2013.

Tweetovi

Blokirali ste korisnika/cu @Anastasis_King

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Anastasis_King

  1. Poništi
  2. Poništi
  3. Poništi
  4. Poništi
  5. Poništi
  6. Java JDBC(Deserialization) Anti-sequence vulnerability automated exploitation Original posting (Chinease) :

    Poništi
  7. Avocent IP KVMs hacking Many KVM switches (local and IP) from major companies like Dell, HP or IBM are manufactured by Avocent.

    Poništi
  8. Abusing DLL Misconfigurations - Using Threat Intelligence to Weaponize R&D

    Poništi
  9. Expanding the Attack Surface: React Native Android Applications

    Poništi
  10. 6 Best Free Malware Analysis Tools to Break Down the Advanced Malware Samples – 2020

    Poništi
  11. Beware of Dangerous Security Risks By Using Open-Source Software and Tools

    Poništi
  12. OSINT-Framework- focused on from free or . The intention is to help people find free OSINT resources. :-

    Poništi
  13. PowerSploit- A - is a collection of PowerShell modules that can be used to aid during all phases of an . :-

    Poništi
  14. exploitdb-bin-sploits- exploits located in the /sploits directory. :-

    Poništi
  15. vulndb- is a and for sources such as , and so on. It uses a built-in file based storage to allow offline access. :-

    Poništi
  16. -- This is a proof of concept , to give researchers and consultants the possibility to show how easy it would be to gain from to a . :-

    Poništi
  17. Dradis Framework:-- Colllaboration and reporting for . Some of the features:- -Platform independent -Markup support for the notes: text styles, code blocks, images, links, etc. :-

    Poništi
  18. PhoneInfoga:-- & for . is one of the most advanced tools to scan phone numbers using only free resources. :-

    Poništi
  19. USB FILE STEALER:-- The files from removable media that connect to a :-

    Poništi
  20. 1. velj

    Infection Monkey:-- . The is an -source tool for testing a data center's resiliency to perimeter and infection. :-

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·