Tweetovi

Blokirali ste korisnika/cu @MJL_PL

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MJL_PL

  1. proslijedio/la je Tweet
    1. velj

    This thing just keeps getting better and better. For years people would complain that PowerShell sucked because ... and then the issue would be about the console. I’ll be glad to see those day’s in my rear-view mirror.

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    [Excellent Read] Was reviewing some of the data in this blog. Solid Write up. by

    Poništi
  3. 4. pro 2019.

    Superb presentation!!! New great way for persistency and total AD domination :)

    Poništi
  4. proslijedio/la je Tweet
    5. ruj 2019.

    Are you curious about the story behind 's , the tool playing with Windows security? Watch 's interview with Benjamin Delpy and !

    Poništi
  5. proslijedio/la je Tweet
    3. ruj 2019.

    Scammer successfully deepfaked CEO's voice to fool underling into transferring $243,000

    Poništi
  6. proslijedio/la je Tweet
    17. kol 2019.

    Responder 2.3.4.0 has been released. This version includes a rogue RDP server supporting RDP clients ranging from Windows7 to Windows 10 (tested) and since MSFT recommends enforcing NLA, Responder collects these NLA NTLM hashes :) Enjoy!

    Poništi
  7. proslijedio/la je Tweet
    15. kol 2019.
    Poništi
  8. proslijedio/la je Tweet

    When your program name is more the new EICAR than a security tool

    Poništi
  9. proslijedio/la je Tweet
    8. kol 2019.

    Black Hat Arsenal 🎩 session done ✅ with Thank you for attending! 🍀 I hope you find our tools useful 💁🏼‍♀️🤗 It’s time for a briefings session! 🤟💪 Thu, Lagoon JKL, 3:50pm Fot. Marcin Baran 💪

    Poništi
  10. proslijedio/la je Tweet

    Critical vulnerability (CVE-2019-11581) found in Jira Server - Template injection in various resources

    Poništi
  11. proslijedio/la je Tweet
    6. svi 2019.

    Check out the talk that was voted Best of Black Hat Asia 2019 Briefings - “CQTools: The New Ultimate Hacking Toolkit” by & &

    Poništi
  12. proslijedio/la je Tweet

    Reminder: when playing with LSA as Protected Process, deleting RunAsPPL registry key is not enough when using UEFI/SecureBoot 🙃 You can use with mimidrv to remove it easily 😬 Or Local Security Authority (LSA) Protected Process Opt-out tool', but it's more difficult!

    Poništi
  13. proslijedio/la je Tweet
    16. sij 2019.
    Poništi
  14. proslijedio/la je Tweet
    Poništi
  15. proslijedio/la je Tweet
    24. pro 2018.

    [webapps] phpMyAdmin 4.8.4 - 'AllowArbitraryServer' Arbitrary File Read

    Poništi
  16. proslijedio/la je Tweet
    Poništi
  17. proslijedio/la je Tweet
    8. pro 2018.

    So it's been a while since my last post, and I've got a few emails asking how to get into malware analysis, so I've compiled a list of all the resources I used to get to the point I am at, which you can find here:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    An easier way to send and receive protected messages. Your email recipients don't have to be in for it to work. Watch this video on Office 365 Message Encryption:

    Poništi
  19. proslijedio/la je Tweet
    5. pro 2018.

    Booooom! ⚠️💥⚠️ Just before delivering Arsenal session about our Forensic Toolkit with new tools, including our 🤩 _CQWSLMon_ 🦝 🦝 😎😎 Stickers! Lanyards! ...pendrives 😈😈!

    Poništi
  20. 5. pro 2018.

    Guess what?! My first 🤩 !!! Anyone up for a coffee and cybertalk 😎

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·