Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @M0nk3H
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @M0nk3H
-
Prikvačeni tweet
Tips & Tricks for preparing for the OSCP and eCPPT. Learn about modifying VPN, documentation strategy, aliases, nc tradecraft, logging, automatic backups, host shares, bug fixes and more.
#OSCP#eCPPThttps://h4ck.co/oscp-journey-exam-lab-prep-tips/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je Tweet
Critical Security Flaw Found in WhatsApp Desktop Platform Allowing Cybercriminals Read From The File System Accesshttps://www.perimeterx.com/tech-blog/2020/whatsapp-fs-read-vuln-disclosure/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
m0nk3h proslijedio/la je Tweet
WooT! There is always a way. New
#bugbounty#pentest short write up! Chain the bugs till you get what you want.#bugbountytip#bugbountytips#hacking Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:)
pic.twitter.com/nlAv4pMPhx
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je Tweet
SNMP Config File Injection to Shell
#infosec#pentest#redteamhttps://digi.ninja/blog/snmp_to_shell.php …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I have hash starting with ee17f17 and ending in f864
#polaritychallenge#shmooconHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je Tweet
A View of Persistence - great post by
@_RastaMouse#infosec#pentest#redteamhttps://rastamouse.me/2018/03/a-view-of-persistence/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je Tweet
[Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:https://medium.com/@maxi./finding-and-exploiting-cve-2018-7445-f3103f163cc1 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je Tweet
An excellent talk by
@ajxchapman: clear methodology, novel bugs and interesting links
https://www.youtube.com/watch?v=AQCvfzwcGso …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je Tweet
Windows Defender Bypassing For Meterpreter by
@myhackerhouse -https://hacker.house/lab/windows-defender-bypassing-for-meterpreter/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je Tweet
I created this repo for the people who want to learn about windows logical privilege escalation bugs. You can contact me to add good article which I missed. https://github.com/sailay1996/awesome_windows_logical_bugs …
#windows_logical_privilege_escalationpic.twitter.com/nRxvGq40LX
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
New reading material

Can’t wait to pickup some new tips and tricks #infosec#redteampic.twitter.com/LypVNTDxOp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je Tweet
Just finished the writeup for my learning process to replicate the CVE-2019-19470, I also public the source code for exploit and a Masquerade-PEB C#. Hope you enjoy! https://plaintext.do/CVE-2019-19470_learning_journey/ …https://twitter.com/JulioUrena/status/1219460407653470208 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je Tweet
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
#infosec#blueteam https://github.com/hunters-forge/ThreatHunter-Playbook …pic.twitter.com/7lNUG9yRj6
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je Tweet
Revisiting RDP lateral movement https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3 … and releasing a project that will be part of a bigger tool coming next week
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yet more amazing that
@SpecterOps continues to put out for our community#infosechttps://twitter.com/SpecterOps/status/1220056427567484934 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Infosec community- what is that Microsoft website that allows you to run 30/60/90 day trials of Windows images in a VM?
#infosecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Really looking forward to checking this out soonhttps://twitter.com/_RastaMouse/status/1219252558193156097 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Is there a shell handler out there already that plays a sweet sound effect when it catches a shell?
#redteamHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je Tweet
Just published a new video: Backdooring an IoT camera by creating a malicious firmware upgrade!https://www.youtube.com/watch?v=hV8W4o-Mu2o …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
m0nk3h proslijedio/la je Tweet
Update CVE-2019-19781 You can exploit the vulnerability without the file http://newbm.pl and only use the file http://rmbm.pl ! You can inject your payload inside the name of the XML file and fire the command execution !

#shitrix#citrixpic.twitter.com/g2P1GAJo1R
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.