ggyy

@Gasgas4Ggyy

chroot/HITCON researcher

Moscow
Vrijeme pridruživanja: studeni 2013.

Tweetovi

Blokirali ste korisnika/cu @Gasgas4Ggyy

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Gasgas4Ggyy

  1. proslijedio/la je Tweet
    5. velj

    自宅でナチュラルに女装する男子 14-5

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    Poništi
  3. proslijedio/la je Tweet

    LogicHub launches MDR+ to provide flexible end-to-end detection and response: LogicHub, the provider of…

    Poništi
  4. proslijedio/la je Tweet
    prije 6 sati

    Two years ago, Symantec and McAfee were both primed for a comeback. Today, both face big questions about their future. via

    Poništi
  5. proslijedio/la je Tweet
    prije 15 sati

    [SW Rewind] Silly Kiddie, Exploits Are For Free -

    Poništi
  6. proslijedio/la je Tweet
    6. velj
    Poništi
  7. proslijedio/la je Tweet
    prije 6 sati
    Odgovor korisnicima

    #! /usr/bin/env bash if [ -z "$1" ]; then echo "Usage: $0 <sudo PID>" fi CA=$((0xbb50 + $(("0x$(sudo cat /proc/$1/maps | grep '\s\[heap\]$' | cut -b -12)")))) sudo gdb -batch -p $1 -ex "x/s " 2>/dev/null | tail -n 1 | sed 's/^0x[0-9a-fA-F]*:\s//' hey that works

    Poništi
  8. proslijedio/la je Tweet
    prije 8 sati

    If you need strong command line encryption on Linux, look no further than 7zip. via

    Poništi
  9. proslijedio/la je Tweet

    Malaysia warns of Chinese hacking campaign targeting government projects Image:Azlan Baharudin Special feature Cyberwar and the Future of Cybersecurity Today's security threats have expanded in scope and seriousness. There ca…

    Poništi
  10. proslijedio/la je Tweet
    6. velj

    Just received permission to share another fun remote code execution chain on an unnamed program! Will be posting it in the coming days at :)

    Poništi
  11. proslijedio/la je Tweet
    prije 13 sati

    I made this handy map so you know how to attribute

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    6. velj

    The released an new version of the Intelligence Analysis technique publication. A lot of content for , though.

    Poništi
  13. proslijedio/la je Tweet
    prije 12 sati

    NEW: China-linked hackers have targeted Malaysian government, officials warn

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    prije 9 sati

    Traefik v2.1.4 releases: modern HTTP reverse proxy and load balancer

    Poništi
  15. proslijedio/la je Tweet
    Poništi
  16. proslijedio/la je Tweet
    prije 9 sati

    BruteX v2.1 releases: Automatically brute force all services running on a target

    Poništi
  17. proslijedio/la je Tweet
    prije 4 sata

    Not hunter2: Analysis and Working Exploit for CVE-2019-18634 (Buffer Overflow in Sudo via pwfeedback)

    Poništi
  18. proslijedio/la je Tweet
    prije 6 sati

    Reverse engineering TP-Link home router's firmware with binwalk

    Poništi
  19. proslijedio/la je Tweet
    prije 10 sati
    Poništi
  20. proslijedio/la je Tweet
    6. velj

    Hardening Windows isn't conceptually difficult: 1. Patch. 2. Harden Office. 3. Change handlers for risky file types 4. CLM. 5. Use some form of app control/AWL. 6. Block/detect LoLbins. 7. Standard User accounts. 8. Deny inbound traffic not fr. PAWs. 9. Manage admin passwords.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·