EZ D

@Dave5623

Water, fire, air, & dirt. Fuckin' magnets! How do they work?

Vrijeme pridruživanja: ožujak 2009.

Tweetovi

Blokirali ste korisnika/cu @Dave5623

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Dave5623

  1. proslijedio/la je Tweet
    3. velj

    My Hacking Channel is now LIVE! Check out my first video (the USB-C one) and get ready for much more! I will be putting my streaming archives here from now on. :)

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    2. velj
    Poništi
  3. proslijedio/la je Tweet
    31. sij

    The code to execute in JS via "System.Runtime.InteropServices.RegistrationServices" here: You need to expose a static method public static void UnRegisterClass(string key) And of course you need an assembly object :) Cheers

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    Load encrypted PE from XML Attribute. MSBuild is still the best.😅 MSBuild sets Property then calls Execute. Use this example to decouple payloads & prove that all security products have a "Single File Bias". Decouple payloads to subvert detection.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    30. sij
    Prikaži ovu nit
    Poništi
  6. Poništi
  7. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    Attacking Azure, Azure AD, and Introducing PowerZure : cc PowerZure : PowerShell script to interact with Azure : Azure AD Connect for Red Teamers :

    Poništi
  9. proslijedio/la je Tweet
    29. sij

    Couple of rough notes on .NET stuff. Avoiding defender + manually patching AMSI to retain Assembly.Load() functionality =)

    Poništi
  10. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    29. sij

    AD Privilege Escalation Exploit: The Overlooked ACL

    Poništi
  12. proslijedio/la je Tweet
    Poništi
  13. proslijedio/la je Tweet
    29. sij
    Poništi
  14. proslijedio/la je Tweet
    27. sij

    Move Faster, Stay Longer blog about extending CS and tools to go with it.

    Poništi
  15. proslijedio/la je Tweet
    28. sij

    x86-manpages : x86 and amd64 instruction reference manual pages : cc x86 and amd64 instruction reference : (Last updated 2019-05-30)

    Poništi
  16. proslijedio/la je Tweet
    28. sij

    CAPEv2 : Malware Configuration And Payload Extraction : Details : BoomBox : Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant :

    Poništi
  17. proslijedio/la je Tweet
    27. sij

    Just pushed a somewhat big update to SILENTTRINITY with a lot of forward compatibility fixes for Python 3.8 and made the PowerShell "stageless" stager public. Plus more modules and bug fixes

    Poništi
  18. proslijedio/la je Tweet
    27. sij

    for espionage based attacks, "high" # of copying data from usb to a tmp staging c:\ folder is expected, other than monitoring cmd.exe's cmdline "*copy*e|f|g:*.pdf|.doc|etc.. .*c:\*" any other ideas?

    Poništi
  19. proslijedio/la je Tweet
    26. sij
    Poništi
  20. proslijedio/la je Tweet
    27. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·