IceSickle

@IceSickle_

Malware Researcher

Ice Cave
Vrijeme pridruživanja: veljača 2016.

Tweetovi

Blokirali ste korisnika/cu @IceSickle_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @IceSickle_

  1. proslijedio/la je Tweet
    22. kol 2018.
    Poništi
  2. proslijedio/la je Tweet
    20. kol 2018.

    updates plugin server config file config here

    Poništi
  3. proslijedio/la je Tweet
    29. lip 2018.

    anybody a total expert on the ins/outs of the emotet malspaming module and system?

    Poništi
  4. proslijedio/la je Tweet
    21. stu 2017.
    Poništi
  5. proslijedio/la je Tweet
    14. stu 2017.

    yesterday asked me for PE-bear without the pop-up about the version - so I made it (+some internal fixes). if anyone interested in trying, it is here:

    Poništi
  6. proslijedio/la je Tweet
    3. lis 2017.

    Hacker over batch released like 20 new boot2roots. Early Christmas, hackerkin! Get to downloading!

    Poništi
  7. proslijedio/la je Tweet
    23. kol 2017.

    Quick fix for not resizing in VMware Workstation, edit /etc/gdm3/daemon.conf [daemon] WaylandEnable=false

    Poništi
  8. proslijedio/la je Tweet
    25. svi 2017.

    How it is to be in ;)

    Poništi
  9. proslijedio/la je Tweet

    oh god i think someone is trapped inside this captcha i just got what do i do

    Poništi
  10. proslijedio/la je Tweet
    18. svi 2017.

    Today is x64dbg's birthday. The first commit on BitBucket was 18 May 2013. Thanks to the community for the fantastic support over the years!

    Poništi
  11. proslijedio/la je Tweet
    14. svi 2017.
    Poništi
  12. proslijedio/la je Tweet
    21. tra 2017.
    Poništi
  13. proslijedio/la je Tweet
    Odgovor korisniku/ci

    In short: avoid ROP, avoid heap spraying, avoid noisy memory ops, avoid bare API, avoid known tech, & try not to kill the bug in the process

    Poništi
  14. proslijedio/la je Tweet
    28. ožu 2017.
    Poništi
  15. proslijedio/la je Tweet

    Ah-ha, I had an epiphany in the shower this morning and realized how to get codeexec in LastPass 4.1.43. Full report and exploit on the way.

    Poništi
  16. proslijedio/la je Tweet
    20. ožu 2017.

    Converting Windows kernel shellcode from previous posts to data only attacks and bypassing KASLR in the process

    Poništi
  17. proslijedio/la je Tweet

    Content-Type: Malicious - New Apache 0-day Under Attack

    Poništi
  18. proslijedio/la je Tweet
    12. ožu 2016.

    There are 10 kinds of infosec people

    Poništi
  19. proslijedio/la je Tweet
    8. velj 2017.

    No one who has hacked a car has given or taken car hacking training. Wanna learn? Read the 500+ pages written by & I 4 free

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·