Fragolax

@Fragollaa

Clothes horse interested in reverse engineering and forensics.

In your closet
Vrijeme pridruživanja: rujan 2011.

Tweetovi

Blokirali ste korisnika/cu @Fragollaa

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Fragollaa

  1. proslijedio/la je Tweet
    5. stu 2019.

    Hacking Tools Cheat Sheet.

    Poništi
  2. proslijedio/la je Tweet
    24. sij
    Poništi
  3. proslijedio/la je Tweet
    14. sij

    Awesome Forensics Resources : Almost 300 open source forensics tools and 600 blog posts about forensics &1000+ Github Repos about Security Resource Collection :

    Poništi
  4. proslijedio/la je Tweet
    3. sij
    Poništi
  5. proslijedio/la je Tweet
    30. pro 2019.

    Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.

    Poništi
  6. proslijedio/la je Tweet
    23. pro 2019.

    Reverse Engineering with Ghidra - Part 0 (Main Windows & CrackMe) : Part 1 (Data, Functions & Scripts) : cc Ghidra - Journey from Classified NSA Tool to Open Source :

    Poništi
  7. proslijedio/la je Tweet
    19. pro 2019.

    Here is the material for my "Reverse Engineering Intel x86/x64 binaries 101" class (using IDA): Hoping to spread the RE fever :)

    Poništi
  8. proslijedio/la je Tweet
    13. pro 2019.

    My Black Hat USA talk with “Attacking & Defending the Microsoft Cloud (Azure AD & Office 365)” is now on YouTube: Slides here:

    Poništi
  9. proslijedio/la je Tweet
    11. pro 2019.

    [New blog] Updating adconnectdump - a journey into DPAPI; In which I describe the process of understanding and decrypting the DPAPI encrypted credentials of Azure AD connect. This again enables dumping these credentials via only network calls (as admin).

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    8. pro 2019.

    this video of cats reacting to cat face filter has me crying.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    4. pro 2019.

    If you are an Azure customer I can’t recommend it enough. Invest time in learning Azure Policy. It will protect you from people doing insecure things.

    Poništi
  12. proslijedio/la je Tweet
    5. pro 2019.

    🌟v2 of my free Intro to Android App Reverse Engineering workshop is here! 🌟 I've added 3 new exercises, walk-through videos for all 7 exercises, a new module on obfuscation, & exercises on vuln hunting rather than just malware. I hope it helps!

    Screenshot of the table of contents at maddiestone.github.io/AndroidAppRE
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    16. stu 2019.

    Published part 1 of a short series on AppLocker internals, no bypasses, just how the technology actually works on Windows 10 1909 and maybe some silly tricks along the way.

    Poništi
  14. proslijedio/la je Tweet
    29. stu 2019.

    Pour le week-end, voici un nouvel article présentant une technique pour lire le contenu d'un dump de lsass **à distance**, évitant ainsi la détection des AV () et le téléchargement de dumps volumineux (80-150Mo). Bon week-end ! 🙃

    Poništi
  15. proslijedio/la je Tweet
    30. stu 2019.

    Windows Privilege Escalation approach: This blog is so articulate and well written for any beginner to learn Windows Privesc. Thanks

    Poništi
  16. proslijedio/la je Tweet
    14. stu 2019.

    Put together this list of popular techniques for gaining persistence in a Linux system (software only!). What else would you include?

    Poništi
  17. proslijedio/la je Tweet
    6. stu 2019.

    Slides and video of my talk "A year of hacking Azure AD" are online! Contains my exploration of the unofficial "1.61-internal" version of the Azure AD graph and the resulting vulnerabilities😃 Slides: Video:

    Poništi
  18. proslijedio/la je Tweet
    31. lis 2019.

    Releasing a new version of Cemu: 0.5 - Impish Tradition. Many cool new features, including more customization and now the possibility to create ready-to-run PE files directly from assembly (thanks to ) Check it out:

    Poništi
  19. proslijedio/la je Tweet
    30. ruj 2019.

    My writeups for all 12 challenges are now available:

    Poništi
  20. proslijedio/la je Tweet
    27. ruj 2019.

    ReversingHero : Learn Reverse Engineering (on 64bit Linux / 15 levels) :

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·