Tweetovi

Blokirali ste korisnika/cu @Heurs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Heurs

  1. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Going to Black Hat USA 2020 and want to learn RF hacking by also making your own tools with Software-Defined Radio? The early bird tickets for the 4-day session are available right here: | !

    Poništi
  4. proslijedio/la je Tweet
    27. sij

    Interested in learning Windows Kernel exploitation ? wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.

    Poništi
  5. proslijedio/la je Tweet
    22. sij

    [New Blog] Analyzing 's Behavior Using a Malware Sandbox

    Poništi
  6. proslijedio/la je Tweet
    21. sij

    Automatic ROP chain generation using ROPgadget (gadgets finding) and Triton (sym. exec. part) by !!

    Poništi
  7. proslijedio/la je Tweet
    20. sij

    The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr as Hypervisor From Scratch could never have existed without his help and to Alex for patiently answering my questions.

    Poništi
  8. proslijedio/la je Tweet
    18. sij

    Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL" 🥳 Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)😎

    Poništi
  9. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  10. proslijedio/la je Tweet
    14. sij
    Poništi
  11. proslijedio/la je Tweet
    14. sij
    Poništi
  12. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    13. sij

    Check our new post: APT27 ZxShell RootKit module updates

    Poništi
  14. proslijedio/la je Tweet
    13. sij

    Épisode #252 consacré à l'outil d'inforensique DFIR ORC, avec Jean Gautier

    Poništi
  15. proslijedio/la je Tweet
    9. sij

    The website is now up! -> . Time for us to write and release a lot of articles and news resources :)

    Poništi
  16. proslijedio/la je Tweet
    8. sij

    [JOB] [FR] Nous sommes actuellement à la recherche de hunters ! Nous rejoindre c'est faire de la réponse à incidents, de la recherche de compromission et de la recherche et développement. Plus d'infos sur :

    Poništi
  17. proslijedio/la je Tweet
    7. sij

    Welcome to the team :) Yet another  veteran reverser to enforce our incident response and hunting activities 💪 New projects are coming!

    Poništi
  18. proslijedio/la je Tweet
    2. sij

    Exploiting Wi-Fi stack on Tesla Model S. Details of vulnerabilities and exploition:

    Poništi
  19. proslijedio/la je Tweet
    20. pro 2019.

    We just updated the executive callback repo with a research on the callback used by PatchGuard

    Poništi
  20. proslijedio/la je Tweet
    17. pro 2019.

    Two days left if you want to be qualified for the Finals to win not one, not two but THREE . 4 Teams are already qualified execve+auditd= <3

    , , i još njih 7
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·