Borja Merino

@BorjaMerino

Security Researcher

Vrijeme pridruživanja: lipanj 2010.

Medijski sadržaj

  1. 26. pro 2019.

    Remote Code Execution in restricted Windows environments

  2. 20. srp 2019.

    Defeating Commercial and Custom Packers like a Pro - VMProtect, ASPack, PECompact, and more:

  3. 19. svi 2019.

    10 years have passed since this video while I was learning the basics of lock picking :/ time flies...

  4. 26. tra 2019.

    Red Teaming in the EDR age

  5. 27. pro 2018.

    DNS Polygraph: tool designed to make easier the identification of techniques such as DNS Hijacking/Poisoning

  6. 28. lip 2018.

    Indeed, here I have mine :)

  7. 3. lip 2018.
  8. 19. svi 2018.
    Odgovor korisniku/ci

    Here the video: it's a must watch

  9. 11. tra 2018.

    Sending probe requests from the "victim host" to check if it's close to you :D

  10. 4. tra 2018.

    Here I share a Nmap NSE script to detect the proxy component of the Hidden Cobra APT attributed to North Korean government:

  11. 28. velj 2018.

    Mi copia ya ha llegado :) /CC

  12. 17. sij 2018.
    Odgovor korisniku/ci
  13. 14. kol 2017.
  14. 15. tra 2016.

    Example of Pazuzu with an embedded poison-ivy

  15. 7. sij 2016.

    Obtaining and Detecting Domain Persistence

  16. 3. pro 2015.

    Nice book from 1999 and still really useful now a days.

  17. 13. lis 2015.

    Breaking Payloads With Runtime Code Stripping And Image Freezing (Black Hat USA 2015)

  18. 10. srp 2015.
  19. 12. velj 2015.

    Stealing Gmail credentials with the ie_proxypac post-exploitation module

  20. 10. sij 2015.

    Secret Pentesting Techniques Nice talk of

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·