Clar3nce

@C1ar3nce_

i shitpost about stuff and things. Aspiring malware analyst in my spare time maybe even professional one day. we can hope..

127.0.0.1
Vrijeme pridruživanja: rujan 2016.

Tweetovi

Blokirali ste korisnika/cu @C1ar3nce_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @C1ar3nce_

  1. proslijedio/la je Tweet

    🎉 New blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous / package using coverage-guided fuzzer. ➡️ Fuzzer: Jsfuzz by ➡️ Target: wasm-parser ➡️ Bug: DoS/OOM

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    I found this article to be excellent. From building Windbg Tooling to working exploits. Its a dense and rich read. Really well done. I thought. Introduction to SpiderMonkey exploitation.

    Poništi
  3. proslijedio/la je Tweet
    28. sij

    Here's my PoC for CVE-2020-7980, a script to gain RCE (root level) to some Satellite controllers.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    27. sij

    Interested in learning Windows Kernel exploitation ? wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.

    Poništi
  5. proslijedio/la je Tweet
    24. sij

    Ahem. We are expecting some royalties from this...

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    24. sij

    2020-01-24: 🔥🆕 Loader | 📉Low Detection Cert -> 🇦🇺[VAS CO PTY LTD] 1⃣Masks as "UBlockPlugin" | x32|64 | 2⃣Block C2: 108.62.118 .46:443 3⃣Anti-CIS Language Check & Main Flow h/t Ref ->

    Poništi
  7. proslijedio/la je Tweet
    24. sij
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    24. sij

    | Vitali Kremez diving into the FIN6 “FrameworkPOS”, targeting payment card data from Point-of-Sale (POS) or eCommerce systems.

    Poništi
  9. proslijedio/la je Tweet
    23. sij
    Poništi
  10. proslijedio/la je Tweet
    23. sij

    2020-01-22:🎯Pro-🇷🇺 Flush DNS |🆕Excel/Word Macro .NET Interop 💬Continues Targeting 🇺🇦Ukrainian Law Enforcement & Military 💡C:\Users\Opolos\source\repos\LoderApp\LoderApp\obj\Debug\Aversome.pdb 🛑C2:masseffect. space MD5:107010d9e4ff8436f872f17a2b13bbe4

    Poništi
  11. proslijedio/la je Tweet
    22. sij

    2020-01-22: 🏦🔥 Banker | 🦹‍♂️ Group & Offshoots 🔩Module: "vnc_x32|64.dll"▶️💻VncStart|StopServer Activating Inject Function via VNC Redirection | 📨"VNC is starting your browser..." 💰Remote Connect for /Account Takeover 🔦Re-Used / VNC Module

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    20. sij
    Poništi
  13. proslijedio/la je Tweet
    16. sij

    2020-01-15:🔥🆕 ITW: 🤑'' Loader Project | 'millionware' Node.js 🔦Seems to be Active/In Development 🛑C2: 178.32.201. 225 ✍️Logging: [*] connected [>] sending handshake ... [>] requesting/receiving new loader h/t Ref⏬

    Poništi
  14. proslijedio/la je Tweet
    15. sij

    2020-01-15: 🆕🔥 Loader 'ldr.exe' | Botnet ID "40300" 🎛️🛑Conf (0x04): { 104.131.41.185:443 178.62.75 .204:1443 138.201 .138.91:3389 62.75.191 .14:3389 } 🛡️Stay Safe 🤔Dridex Seems Extremely Active Now in Distro Mode h/t

    Poništi
  15. proslijedio/la je Tweet
    15. sij

    2020-01-15: 🤡⛈️ Cert -> 🇸🇮[MONT-DMD d.o.o.] Same Crypter New🆕👇 🔥Added "foldhelper" Windows 10 UAC bypass by hijacking a special key in the Registry 🔦Focuses More & More on Windows 10 MD5:18A19C324963BB69A492ACCF4E9A7600 h/t

    Poništi
  16. proslijedio/la je Tweet
    14. sij

    Nemty Ransomware - Control Panel - Paying a ransom merely incentivizes future ransomware attacks by financing the attackers and proving that victims will pay ... 😪😪😪

    Poništi
  17. proslijedio/la je Tweet
    15. sij

    2020-01-14: 🆕 Banker 'lrd.exe' | Botnet ID "10222" 1⃣Spam Theme: Invoice -> Watch Out🛡️ 2⃣December 29 Build 3⃣Same "[ERR] Heap corrupted" Fake Error 🔥Dridex Top Cybercrime Enterprise Going Strong in 2020 h/t Link:

    Poništi
  18. proslijedio/la je Tweet
    6. sij

    This project was built in order to practice my C++ skills. A simple POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread.

    Poništi
  19. proslijedio/la je Tweet
    29. pro 2019.

    CCT ZbotScan as VT graph: with some additional details related to Microsoft citadel sinkhole operation (warning: heavy graph)

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    27. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·