Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Fr3eXc0d3r
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Fr3eXc0d3r
-
Xc0d3r proslijedio/la je Tweet
[COM hijacking] While I was looking for some methods related to the COM hijacking technique, I found a new method that allows you to hijack COM and execute Scriptlet instructions :) Registry import file: https://gist.github.com/homjxi0e/caa276ba43b17bb9cb9867b40b774e17 …pic.twitter.com/o8oX1mSypF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
PHP 7.0-7.4 disable_functions bypass 0day PoChttps://github.com/mm0r1/exploits/tree/master/php7-backtrace-bypass …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
Thanks for the feedback
@mysmartlogon, I appreciate it! I think I have posted about something similar to what you suggested https://ired.team/offensive-security/credential-access-and-credential-dumping/intercepting-logon-credentials-via-custom-security-support-provider-and-authentication-package … The post you commented on, however, had a slightly different learning goals for me - signature and hooking being the key ones.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
Some study notes on LSASS hooking for harvesting interactive logon credentials. https://ired.team/offensive-security/credential-access-and-credential-dumping/intercepting-logon-credentials-by-hooking-msv1_0-spacceptcredentials … Thanks to
@_xpn_ for his inspiring posts about mimikatz.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
• Read everyday. • Spend time with nature. • Ask questions. • Never stop learning. • Don't pay attention to what others think of you. • Do what interests you the most. • Study hard. • Teach others what you know. • Make mistakes and learn. • It's Okay to not know things!pic.twitter.com/MmdOjZBWYd
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
Mapping-Injection - Process injection technique that avoids the usage of common monitored syscall VirtualAllocEx and WriteProcessMemoryhttps://github.com/antonioCoco/Mapping-Injection …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
sems : Anti-Sandbox and Anti-Virtual Machine Tool :https://github.com/AlicanAkyol/sems …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
CVE-2019-2890 WebLogic 反序列化RCE漏洞 POC from https://github.com/SukaraLin/CVE-2019-2890 …pic.twitter.com/tMgYUW8aPI
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
you can UAC bypass all executable files which are autoelevate true base on my first article. UAC Bypass All the things POCs: https://github.com/sailay1996/UAC_Bypass_In_The_Wild … sample: Bluetooth uninstall device task (UAC Bypass to administrator)pic.twitter.com/TawDPFRvLc
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
Mimikatz implementation in pure Python. At least a part of it :)https://github.com/skelsec/pypykatz …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Only one easy command can BYPASS most of sensitive-action detection of HuoRong(personal).pic.twitter.com/HjAlalJNNM
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
Nice write up of how to evade Defender ATP when trying to dump LSASS (credentials) and a VB project called ATPMiniDump: https://www.matteomalvica.com/blog/2019/12/02/win-defender-atp-cred-bypass/ … Dumping LSASS memory with MiniDumpWriteDump on PssCaptureSnapShot to evade WinDefender ATP credential-theft.https://github.com/b4rtik/ATPMiniDump …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
Cobalt Strike 4.0 is coming out soon! Manual is online but release notes are not. Someone took the liberty to diff them https://draftable.com/compare/BnkRZIdUIdaR … v4 Manual: http://cobaltstrike.com/downloads/csmanual40.pdf …
#c2matrix#redteamHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This is the truth of Hongkong !https://twitter.com/smarian88/status/1197395722259222528 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
Added a new contributor
@TimMedin to#c2matrix who just completed@armitagehacker Cobalt Strike! Thank you Tim! Website will be updated some time today. DM@jorgeorchilles if you would like to contribute. Golden source is Google Sheet:https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit?ts=5dd55b73#gid=0 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
IE9/IE11 Vulnerability advanced exploitation: PoC+slides on how to bypass ASLR+DEP to exploit IE9-IE11 successfullyhttps://github.com/k33nteam/IE9-IE11-Vulnerability-Advanced-Exploitation …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Xc0d3r proslijedio/la je Tweet
I wrote a small tool, SwampThing, to demo command line spoofing as outlined by
@joehowwolf in his recent talk at Wild West Hackin Fest (definitely go check that out!). Think here about uses cases like WMIC with stylesheets
=> https://github.com/FuzzySecurity/Sharp-Suite …pic.twitter.com/IncYGCTmbo
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
If you are a Malware researcher/analyst and need access to malware samples you can visit my malware samples library at http://iec56w4ibovnb4wc.onion (With Tor Browser). I mainly collect APT variants among other malware types. It is currently Tor only access.
#malware#infosec#Torpic.twitter.com/v0B5Q8TPAT
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Xc0d3r proslijedio/la je Tweet
changeme A default credential scanner by
@ztgrace https://github.com/ztgrace/changeme … > maybe this project following the "sniper" approach could benefit from@DanielX4v3r's "shotgun" lists https://github.com/govolution/betterdefaultpasslist …pic.twitter.com/eOD8Rklhpe
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.