Tweetovi

Blokirali ste korisnika/cu @Cyb3rWard0g

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Cyb3rWard0g

  1. Prikvačeni tweet
    18. pro 2019.

    I decided to write a book 😅! An online Interactive Book 💥! A book on the top of , and w/ BinderHub links all put together w/ the amazing Jupyter Book project! Merry Christmas 🎄🎁 🍻

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Have you looked at the Notebook features in but wanted to know more? Check out this deep dive of our Host Explorer Notebook to understand what it is doing and how to use it:

    Poništi
  3. 1. velj

    Oh and all from my phone 📱😱 ! No excuses 😉😅 🍻 I'm so happy I can use open tools and Infrastructure to share resources with the community. Thank you and teams to make it all possible 💜

    Prikaži ovu nit
    Poništi
  4. 1. velj

    Someone asked how easy or practical it was to use the I shared earlier 😉 1. Click on the link 🚀 2. Wait for Binder to launch the Jupyter server 🌎 (Free. Open Infrastructure) 3. Run every cell and 💥🍻

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    The CFP for fwd:cloudsec is now open! Details at Also we've got a logo, so finally we can start handing out stickers soon.

    Poništi
  6. 31. sij

    Has anyone (boss, client, student, etc) ever asked you in what Windows event log can you find a process, IP address, InterfaceUuid, etc? Very helpful to identify providers that you might need to start collecting data from. is using online interactive

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    31. sij

    New OSSEM updates are coming soon and some of the work being tested is the following: 1. Events from all manifest-based and mof-based ETW providers from several Windows 10 versions (Ref: ) as JSON: YAML:

    Prikaži ovu nit
    Poništi
  8. 30. sij

    That's awesome! Thank you for sharing ! Happy to see the projects being referenced in other conferences around the 🌎 I hope to make it to one day 😉

    Poništi
  9. 30. sij

    Looking forward to it ! Thank you for the opportunity 🙏 can't wait to share a few initiatives to share and collaborate more with the community 🍻💜

    Poništi
  10. proslijedio/la je Tweet
    24. sij

    Con el Master filosofando acerca de cybersecurity ! Faltaron unos cuantos amig@s

    Poništi
  11. proslijedio/la je Tweet
    19. sij

    command-line MSBuild.exe detection's got your down? How about MSBuild without MSBuild.exe?

    Poništi
  12. proslijedio/la je Tweet
    18. sij

    Okay here it is, Zipper a new file and folder compression utility for CobaltStrike. Blue Teams/Hunters/Defenders: Lookout for non file-compression related processes creating (random named) zipfiles within temp folders.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    17. sij

    Hunting in Sentinel is now in public preview so you can get started with livestream sessions and check it out

    Poništi
  14. proslijedio/la je Tweet
    16. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    has published a number of his hunts as well. The raw YAML formats are probably good for automation and ingesting into tools () while the finished playbooks are nicely formatted for analysts ()

    Poništi
  15. proslijedio/la je Tweet
    14. sij

    New today by MSTIC’s ⁦⁩ . Learning from cryptocurrency mining attack scripts on Linux TI’s.

    Poništi
  16. proslijedio/la je Tweet
    14. sij

    msticpy now has a user guide! We've had basic API docs for a long time but have finally got around to writing some more accessible guides to using the package. Sample notebooks also included for many modules. Enjoy!

    Prikaži ovu nit
    Poništi
  17. 11. sij

    How do you integrate with the project? How do you convert 300+ rules to ES query strings & pack them as part of notebooks to query ES? All from code 😱. I wrote about it here! Weekend readings! 🍻

    Poništi
  18. proslijedio/la je Tweet
    9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi
  19. proslijedio/la je Tweet
    9. sij

    Spray-AD, a new Kerberos password spraying tool for Cobalt Strike that might come in handy when assessing Active Directory environments for weak passwords (generates event IDs 4771 instead of 4625).

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    8. sij

    0.3.0 released! 🧙‍♂️🥧 Want to combine your and data? Well now you can with our connector.

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    8. sij

    msticpy 0.3.0 released New features: MS @WindowsATP queries, ProcessTree interactive viewer (using Bokeh), querying of Azure resource and subscription data from Thx and

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·