Tweetovi

Blokirali ste korisnika/cu @Debug_Orz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Debug_Orz

  1. proslijedio/la je Tweet
    25. sij
    Poništi
  2. proslijedio/la je Tweet
    26. sij

    TOP 20 tools every blue teamer should have in 2020 shared by . Do you have your list of tools? Share on !

    Poništi
  3. proslijedio/la je Tweet
    26. sij
    Poništi
  4. proslijedio/la je Tweet
    23. sij

    New blogpost focused on Defenders and Red Teamers related to manipulating VirusTotal link results

    Poništi
  5. proslijedio/la je Tweet

    Invoke-WMILM - A PoC script for various methods to acheive authenticated remote code execution via WMI, without (at least directly) using the Win32_Process class. The type of technique is determined by the "Type" parameter.

    Poništi
  6. proslijedio/la je Tweet
    24. sij

    Hello, guys! Finally, I have released new 3 tools for and for macOS. Please try them and have a nice weekend :) 1st tool: Norimaci is malware analysis sandbox for macOS. This tool was inspired Noriben sandbox. (1/3)

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    24. sij

    There are many ways to the kernel, and may be a useful technique. Tracing is all about recording and logging the software's flow of execution, and this article is about , the tracing framework for the Linux kernel.

    Poništi
  8. proslijedio/la je Tweet
    25. sij
    Poništi
  9. proslijedio/la je Tweet
    21. sij

    Microsoft Windows 10 (19H1 1901 x64) ws2ifsl.sys Use After Free Local Privilege Escalation (kASLR kCFG SMEP)

    Poništi
  10. proslijedio/la je Tweet

    Red Team Diary, Entry #3: Custom Malware Development (Establishing A Shell Through the Target’s Browser)

    Poništi
  11. proslijedio/la je Tweet
    22. sij

    Releasing an automated pipeline for bugbounty target reconnaissance today. Along with it are 6 blog posts detailing the build process / design. The github repo is tagged to correspond to blog posts. Enjoy! 🙃 repo:

    Poništi
  12. proslijedio/la je Tweet
    22. sij

    New from - Revisiting Remote Desktop Lateral Movement This post discusses RDP lateral movement by leveraging mstscax.dll. Steven also is releasing SharpRDP with corresponding detection guidance for this attack technique. Post:

    Poništi
  13. proslijedio/la je Tweet
    8. sij
    Poništi
  14. proslijedio/la je Tweet
    7. sij

    【内网渗透-创建Windows用户】 Ps: net net1 等常见命令被过滤 简介:adduser项目以编程方式创建“本地管理员” Windows用户。需要管理员权限。创建的用户被硬编码为以下内容: 默认登录名:audit 密码:(Test123456789! ) 你可以在源码中自定义修改账号密码

    Poništi
  15. proslijedio/la je Tweet
    5. sij

    One-Way Shellcode for firewall evasion using Out Of Band data

    Poništi
  16. proslijedio/la je Tweet
    6. sij

    My first bug bounty writeup. It was a bit inexperienced but I wanted to share :)

    Poništi
  17. proslijedio/la je Tweet
    7. sij

    Here is the first post of my planned fuzzing (file parsers) series: As promised it is foundation level and mainly targeted to people starting with fuzzing. The next post will continue from it and will cover my approach to collecting files for mutating.

    Poništi
  18. Poništi
  19. proslijedio/la je Tweet
    6. sij

    This project was built in order to practice my C++ skills. A simple POC for process injection using NtCreateSectrion, NtMapViewOfSection and RtlCreateUserThread.

    Poništi
  20. proslijedio/la je Tweet
    6. sij

    My first blog post! Bypassing AV via in-memory PE execution. I've created a tool to go along with the post and help automate creating undetected PEs, links inside the post 😉

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·