gartzen

@Gartzen72

( ͡° ͜ʖ ͡°) Security vs Obscurity

Brussels
Vrijeme pridruživanja: veljača 2014.

Tweetovi

Blokirali ste korisnika/cu @Gartzen72

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Gartzen72

  1. proslijedio/la je Tweet

    Ce designer a créé 2 magnifiques jeux de cartes Star Wars, version Jedi ou Sith Plus d'infos :

    Poništi
  2. proslijedio/la je Tweet
    prije 18 sati

    If you ever get excited about finding HKCU\SOFTWARE\Microsoft\MediaPlayer\Preferences\ScriptDebugging don't...

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  4. proslijedio/la je Tweet
    prije 12 sati

    Analysis of a triple-encrypted AZORult downloader

    Poništi
  5. proslijedio/la je Tweet
    prije 12 sati

    プロセスからEmotetを検知するWindows OS用ツールEmoCheckをGitHubに公開しました。Emotetの感染調査などにご活用ください。 ^TT

    Poništi
  6. proslijedio/la je Tweet
    prije 11 sati

    What if you could mount TheHive as a remote filesystem? What if you could very simply access all files added to a case, as observables or attached to tasks from your investigation machine? TheHive 4.0-RC1. End of February 2020.…

    Poništi
  7. proslijedio/la je Tweet
    31. sij

    Systems patched for Citrix -2019-19781 may still be compromised. See 's latest Activity Alert at for procedures for detecting a compromise.

    Poništi
  8. proslijedio/la je Tweet
    31. sij
    Poništi
  9. proslijedio/la je Tweet
    31. sij

    If you want to try my web challenge for the FIC2020, it will be available at for a few days. It's intended to be a ~30min chall. Good Luck/Have Fun

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    31. sij

    Reversing XignCode3 Anticheat – Registering Notify and Callback Routines Part 4.1 is out! 🤯 Anti-cheats use callbacks and notification routines to control what is happening on your system, let's dig into this

    Poništi
  11. proslijedio/la je Tweet
    31. sij
    Poništi
  12. proslijedio/la je Tweet
    1. velj

    Attribution in investigations and false flag operations - some notes on 2019 great talk. If you are in you should check out his talk. Maybe better INT sharing would help.

    Poništi
  13. proslijedio/la je Tweet
    1. velj
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    1. velj

    🔥 iOS 13.3 / 13.2 / 13.0 A12 / A13 BIG News: New TFP0 Kernel Exploit To Be Released Soon! 📹 VIDEO: It's likely that this would be useful to update Unc0ver, I explain in-depth in the video.

    Poništi
  15. proslijedio/la je Tweet
    1. velj
    Poništi
  16. proslijedio/la je Tweet
    1. velj

    If you need a name for a new malware, threat group operation or hack tool, check this Imgur gallery with 29 posters showing deities, monsters and heroes of different mythologies

    Poništi
  17. proslijedio/la je Tweet
    1. velj

    2020-01-31: 🇨🇳 Targets Universities👨‍🎓 🔩|XOR Decoder| rule apt_win32_winnti_xordec { strings: $decoder_xor = { 8B C3 C1 E3 10 C1 E8 10 03 D8 6B DB 77 83 C3 13 } condition: $decoder_xor } Ref⬇️

    Poništi
  18. proslijedio/la je Tweet
    31. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·