evil comrade

@EvilComrade

Network Engineer, Security Enthusiast, Full-time noob, some know me as 王卫

Vrijeme pridruživanja: rujan 2014.

Tweetovi

Blokirali ste korisnika/cu @EvilComrade

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @EvilComrade

  1. proslijedio/la je Tweet
    24. sij

    Hello, guys! Finally, I have released new 3 tools for and for macOS. Please try them and have a nice weekend :) 1st tool: Norimaci is malware analysis sandbox for macOS. This tool was inspired Noriben sandbox. (1/3)

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    30. pro 2019.

    Widespread state hacking of airport biometric data. A compromise of CIA officers in Moscow. The end of fake IDs. Based on conversations w over 40 officials, & I did a deep dive on how the digital age has transformed human spying forever:

    Poništi
  3. proslijedio/la je Tweet
    11. pro 2019.

    We are finally releasing our 2018 short documentary about OPCDE Kenya meets Subtitles available in multiple languages. We are also releasing our 2020 social impact report:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  5. proslijedio/la je Tweet
    5. pro 2019.
    Poništi
  6. proslijedio/la je Tweet
    5. pro 2019.

    🌟v2 of my free Intro to Android App Reverse Engineering workshop is here! 🌟 I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!

    Screenshot of the table of contents at maddiestone.github.io/AndroidAppRE
    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    3. pro 2019.

    Today I'm releasing a novel DNS covert channel implant. Everything is done over encoded AAAA requests (hostnames) and responses (IPv6 addresses) so it evades existing DNS detections. Low bandwidth, 100% Python3 with no dependencies, run it anywhere

    Poništi
  8. proslijedio/la je Tweet
    4. pro 2019.

    The second part of my series of posts on FreeIPA is out. This post covers basic enumeration techniques inside of a FreeIPA environment.

    Poništi
  9. proslijedio/la je Tweet
    25. stu 2019.

    Shooting up a call to more ladies to join the program which seeks to increase the representation of women in technology leadership roles & the tech workforce

    Poništi
  10. proslijedio/la je Tweet
    25. stu 2019.

    Today I was able to release the first post of a series of blog posts about attacking FreeIPA, an open source alternative to Windows Active Directory inside of unix environments. This post covers authentication, and situational awareness.

    Poništi
  11. proslijedio/la je Tweet
    22. stu 2019.

    I wrote a blog post: Practical Guide to Passing Kerberos Tickets From Linux

    Poništi
  12. proslijedio/la je Tweet
    22. stu 2019.

    A completely free, open source and online course about Reverse Engineering iOS Applications

    Poništi
  13. proslijedio/la je Tweet
    15. stu 2019.

    I just published Man-in-the-Network: Network Devices are Endpoints too Special thanks to for his Sigma project, and to for the encouragement! I hope you integrate these changes to include Network devices as a platform.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    15. stu 2019.

    Red Team Operations video series with Cobalt Strike 4.0 looks *amazing*.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    15. stu 2019.
    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    15. stu 2019.

    This is literally just, like, a hundred Chinese security researchers testing their 0days in competition against modern software targets. It is probably the densest collection of 0days per sqm in the world, and I’ve seen only one organic tweet about it. Infosec Twitter, wtf?!?

    Poništi
  17. proslijedio/la je Tweet
    15. stu 2019.

    Geared up! 2019 PWN contest kicks off at 9am tomorrow (GMT+8). Stay tuned~

    Poništi
  18. proslijedio/la je Tweet
    13. stu 2019.
    Poništi
  19. proslijedio/la je Tweet

    NetworkMiner 2.5 released! Now with support and parsers for , , , and protocols.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·