RTFM[ChOkO]

@ChOkO088

RTFM - Red Team Freakin Maniacs CTF Team's co-founder. Zerg turtle user | BJJ & Chess n00b | OSCP

Zerg Overmind
Vrijeme pridruživanja: lipanj 2015.

Tweetovi

Blokirali ste korisnika/cu @ChOkO088

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ChOkO088

  1. proslijedio/la je Tweet
    22. sij

    TIL 7-zip can mount a VMDK.

    Poništi
  2. proslijedio/la je Tweet
    11. sij

    We have just released a new tool for exploiting CVE-2019-19781. Our goal was to keep private as long as possible to have a longer window to fix. Other researchers have published the exploit code in the wild already. Cats out of the bag.

    Poništi
  3. proslijedio/la je Tweet
    9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi
  4. proslijedio/la je Tweet
    6. sij

    7001 actions possibilities to you to create an AWS IAM Policy with least privilege and you are using * . Please spend more time studying and learning AWS IAM. It’s not too easy but it’s worth.

    Poništi
  5. proslijedio/la je Tweet
    2. sij

    lsassy 1.0.0 is finally out ! 🔸 Remotely dump **with built-in Windows tools only**, procdump is no longer necessary 🔸 Remotely parse lsass dumps to extract credentials 🔸 Link to to detect compromised users with path to Domain Admin

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    4. sij

    HUNT Suite is a collection of Burp Suite Pro/Free and OWASP ZAP extensions. Identifies common parameters vulnerable to certain vulnerability classes (Burp Suite Pro and OWASP ZAP). Organize testing methodologies (Burp Suite Pro and Free).

    Poništi
  7. proslijedio/la je Tweet

    PE Import Table hijacking as a way of achieving persistence/exploiting DLL side loading (Christmas blog post 😉):

    Poništi
  8. proslijedio/la je Tweet
    26. pro 2019.

    "StAhrCrUft is jUSt AbOut WhO cLicKS fAsta itZ nOt StrATEgy GaEm" This tiny summary of late game Zerg vs Protoss composition counters gives a glimpse into the endless strategic depth waiting to be tapped. Whilst…

    Poništi
  9. proslijedio/la je Tweet
    22. pro 2019.

    Just uploaded "Advanced PHP Deserialization - PHAR Files", It's pretty much just me walking through the PHP Deserialization exploit presented at last year.

    Poništi
  10. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  11. proslijedio/la je Tweet
    Poništi
  12. proslijedio/la je Tweet
    30. stu 2019.

    Need some help from the community. Mu baby sister (she hates when I call her that) has thyroid cancer and needs help with her medical bills. Mu wife created this GoFundMe page to help her out with her bills. Any amount helps

    Poništi
  13. proslijedio/la je Tweet
    27. stu 2019.

    🎁🎁 Launching In 2 Weeks 🎁🎁 KringleCon II brings together some of the globe’s top voices in cybersecurity. Grab a front row seat to the North Pole’s premier hacking conference ➡️

    , , i još njih 5
    Poništi
  14. proslijedio/la je Tweet
    Poništi
  15. proslijedio/la je Tweet
    18. stu 2019.

    We have open sourced our legal documentation used for physical penetration tests. The purpose is to help the community and organizations protect their employees when conducting testing. Includes three docs: MSA SOW Authorization Letter

    Poništi
  16. proslijedio/la je Tweet

    Reddit dug up footage of the Spurs playing Starcraft 2v2 between games of the 1999 NBA finals the track balls mice, the old laptops the intro music, Timmy getting mad losing to the Admiral. it's all amazing (thx r/NBA)

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    16. stu 2019.

    I have made an update to my OSCP-Like vm list for . Three new boxes have been added to the list. If you have VIP and are preparing for OSCP check out those boxes! If you don't check out videos to watch them. They will be added to the OSCP playlist soon.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    15. stu 2019.

    [Blog] CVE-2019–12757: Local Privilege Escalation in Symantec Endpoint Protection

    Poništi
  19. proslijedio/la je Tweet

    Programmers unite!

    Poništi
  20. proslijedio/la je Tweet
    12. stu 2019.

    pip3 install ldapdomaindump pip3 install adidnsdump adidnsdump -u \\$user -p "$pass" ldapdomaindump -u \\$user -p "$pass" records.csv |cut -d "," -f3 cat domain_computers.json |grep -A1 dNSHostName | cut -d '"' -f2 |grep -v "dNSHostName"

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·