Xc0d3r

@Fr3eXc0d3r

Vrijeme pridruživanja: svibanj 2012.

Tweetovi

Blokirali ste korisnika/cu @Fr3eXc0d3r

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Fr3eXc0d3r

  1. proslijedio/la je Tweet
    2. velj

    [COM hijacking] While I was looking for some methods related to the COM hijacking technique, I found a new method that allows you to hijack COM and execute Scriptlet instructions :) Registry import file:

    Poništi
  2. proslijedio/la je Tweet
    30. sij
    Poništi
  3. proslijedio/la je Tweet
    27. sij
    Odgovor korisnicima

    Thanks for the feedback , I appreciate it! I think I have posted about something similar to what you suggested The post you commented on, however, had a slightly different learning goals for me - signature and hooking being the key ones.

    Poništi
  4. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  5. proslijedio/la je Tweet
    19. sij

    • Read everyday. • Spend time with nature. • Ask questions. • Never stop learning. • Don't pay attention to what others think of you. • Do what interests you the most. • Study hard. • Teach others what you know. • Make mistakes and learn. • It's Okay to not know things!

    Poništi
  6. proslijedio/la je Tweet
    4. sij

    Mapping-Injection - Process injection technique that avoids the usage of common monitored syscall VirtualAllocEx and WriteProcessMemory

    Poništi
  7. proslijedio/la je Tweet
    30. svi 2016.

    sems : Anti-Sandbox and Anti-Virtual Machine Tool :

    Poništi
  8. proslijedio/la je Tweet
    7. pro 2019.

    CVE-2019-2890 WebLogic 反序列化RCE漏洞 POC from

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    8. pro 2019.

    you can UAC bypass all executable files which are autoelevate true base on my first article. UAC Bypass All the things POCs: sample: Bluetooth uninstall device task (UAC Bypass to administrator)

    Poništi
  10. proslijedio/la je Tweet

    Mimikatz implementation in pure Python. At least a part of it :)

    Poništi
  11. 3. pro 2019.

    Only one easy command can BYPASS most of sensitive-action detection of HuoRong(personal).

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  12. proslijedio/la je Tweet
    2. pro 2019.

    Nice write up of how to evade Defender ATP when trying to dump LSASS (credentials) and a VB project called ATPMiniDump: Dumping LSASS memory with MiniDumpWriteDump on PssCaptureSnapShot to evade WinDefender ATP credential-theft.

    Poništi
  13. proslijedio/la je Tweet
    3. pro 2019.

    Cobalt Strike 4.0 is coming out soon! Manual is online but release notes are not. Someone took the liberty to diff them v4 Manual:

    Poništi
  14. 21. stu 2019.
    Poništi
  15. proslijedio/la je Tweet
    20. stu 2019.

    Added a new contributor to who just completed Cobalt Strike! Thank you Tim! Website will be updated some time today. DM if you would like to contribute. Golden source is Google Sheet:

    Poništi
  16. proslijedio/la je Tweet
    24. ruj 2019.

    IE9/IE11 Vulnerability advanced exploitation: PoC+slides on how to bypass ASLR+DEP to exploit IE9-IE11 successfully

    Poništi
  17. 10. ožu 2019.
    Poništi
  18. proslijedio/la je Tweet
    9. pro 2018.

    I wrote a small tool, SwampThing, to demo command line spoofing as outlined by in his recent talk at Wild West Hackin Fest (definitely go check that out!). Think here about uses cases like WMIC with stylesheets 🧙‍♂️ =>

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    23. pro 2018.

    If you are a Malware researcher/analyst and need access to malware samples you can visit my malware samples library at (With Tor Browser). I mainly collect APT variants among other malware types. It is currently Tor only access.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    6. pro 2018.

    changeme A default credential scanner by > maybe this project following the "sniper" approach could benefit from 's "shotgun" lists

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·