Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Debug_Orz
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Debug_Orz
-
Debug_Orz proslijedio/la je Tweet
In-Memory Evasion - 5 great videos
#infosec#pentest#redteamhttps://blog.cobaltstrike.com/2018/02/08/in-memory-evasion/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
TOP 20 tools every blue teamer should have in 2020 shared by
@chihebchebbi201. Do you have your list of tools? Share on@Peerlyst!http://ow.ly/6TCk30qchi4Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
GDA is a Dalvik bytecode decompiler written entirely in c++: https://github.com/charles2gan/GDA-android-reversing-Tool/wiki …
#android#security#reversing#decompiler#cpp#bytecodeHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
New blogpost focused on Defenders and Red Teamers related to manipulating VirusTotal link resultshttps://medium.com/maverislabs/virustotal-is-not-an-incident-responder-80a6bb687eb9 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
Invoke-WMILM - A PoC script for various methods to acheive authenticated remote code execution via WMI, without (at least directly) using the Win32_Process class. The type of technique is determined by the "Type" parameter.https://github.com/Cybereason/Invoke-WMILM …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
Hello,
#DFIR guys! Finally, I have released new 3 tools for#mac4n6 and#MalwareAnalysis for macOS. Please try them and have a nice weekend :) 1st tool: Norimaci is malware analysis sandbox for macOS. This tool was inspired Noriben sandbox. https://github.com/mnrkbys/norimaci … (1/3)Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
There are many ways to
#debug the#Linux kernel, and#tracing may be a useful technique. Tracing is all about recording and logging the software's flow of execution, and this article is about#ftrace, the tracing framework for the Linux kernel. https://embeddedbits.org/tracing-the-linux-kernel-with-ftrace/ …@srostedtHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
Analyzing Modern Malware Techniques - Part 2 https://0x00sec.org/t/analyzing-modern-malware-techniques-part-2/18765 …
#ReverseEngineering#Malware#PowerShell#Windows#Infosecpic.twitter.com/vDg0CwC4BR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
Microsoft Windows 10 (19H1 1901 x64) ws2ifsl.sys Use After Free Local Privilege Escalation (kASLR kCFG SMEP)
#exploit#CyberSecurity https://cxsecurity.com/issue/WLB-2020010165 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
Red Team Diary, Entry #3: Custom Malware Development (Establishing A Shell Through the Target’s Browser)https://blog.usejournal.com/red-team-diary-entry-3-custom-malware-development-establish-a-shell-through-the-browser-bed97c6398a5 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
Releasing an automated pipeline for bugbounty target reconnaissance today. Along with it are 6 blog posts detailing the build process / design. The github repo is tagged to correspond to blog posts. Enjoy!
#BugBounty repo: https://github.com/epi052/recon-pipeline …https://epi052.gitlab.io/notes-to-self/blog/2019-09-01-how-to-build-an-automated-recon-pipeline-with-python-and-luigi/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
New from
@0xthirteen - Revisiting Remote Desktop Lateral Movement This post discusses RDP lateral movement by leveraging mstscax.dll. Steven also is releasing SharpRDP with corresponding detection guidance for this attack technique. Post:https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
(interesting write-up) CVE-2019-1215 Analysis of a Use After Free in ws2ifsl: https://labs.bluefrostsecurity.de/blog/2020/01/07/cve-2019-1215-analysis-of-a-use-after-free-in-ws2ifsl/ …
#exploitation#cve#windows#drivers#securityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
【内网渗透-创建Windows用户】 Ps: net net1 等常见命令被过滤 简介:adduser项目以编程方式创建“本地管理员” Windows用户。需要管理员权限。创建的用户被硬编码为以下内容: 默认登录名:audit 密码:(Test123456789! ) 你可以在源码中自定义修改账号密码 https://github.com/newsoft/adduser pic.twitter.com/0aUN7V3ZMp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
One-Way Shellcode for firewall evasion using Out Of Band data https://www.shelliscoming.com/2019/03/one-way-shellcode-for-firewall-evasion.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
My first bug bounty writeup. It was a bit inexperienced but I wanted to share :)
#bugbountytips#bugbountytip#infosechttps://medium.com/@gguzelkokar.mdbf15/xss-on-sony-subdomain-feddaea8f5ac …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
Here is the first post of my planned fuzzing (file parsers) series: https://foxhex0ne.blogspot.com/2020/01/lets-get-things-going-with-basics-of.html … As promised it is foundation level and mainly targeted to people starting with fuzzing. The next post will continue from it and will cover my approach to collecting files for mutating.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
SQL injection Write-ups https://strynx.org/insecure-crypto-code-execution/ … https://link.medium.com/wX2VXp7f02 https://www.rcesecurity.com/2019/09/H1-4420-From-Quiz-to-Admin-Chaining-Two-0-Days-to-Compromise-an-Uber-Wordpress … https://robinverton.de/blog/2019/08/25/bug-bounty-bypassing-a-crappy-waf-to-exploit-a-blind-sql-injection … https://aaronesau.com/blog/posts/5 https://www.mohamedharon.com/2019/07/sql-injection-in-private-sitecomloginphp.html … https://blog.parthmalhotra.com/pwning-child-company-to-get-access-to-parentcompanys-slack-team … https://www.noob.ninja/2019/07/exploiting-tricky-blind-sql-injection.html … https://link.medium.com/YwS8vckO22
#bugbounty,#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
This project was built in order to practice my C++ skills. A simple POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread.https://github.com/panagioto/Mimir
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Debug_Orz proslijedio/la je Tweet
My first blog post! Bypassing AV via in-memory PE execution. I've created a tool to go along with the post and help automate creating undetected PEs, links inside the post
https://blog.dylan.codes/bypassing-av-via/ …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.