Uriel Kosayev

@MalFuzzer

Malware Research | Reversing | DFIR | Pentesting | Co-Founder, Security Researcher, Consultant, Lecturer

 
Vrijeme pridruživanja: prosinac 2017.

Tweetovi

Blokirali ste korisnika/cu @MalFuzzer

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MalFuzzer

  1. Prikvačeni tweet
    15. pro 2019.

    Android malware researchers! We've added Android malware analysis tools, books, samples and much more at

    Poništi
  2. prije 4 sata
    Poništi
  3. 3. velj
    Poništi
  4. 3. velj
    Poništi
  5. proslijedio/la je Tweet
    2. velj

    How to create fake traffic jams in Google Maps with bucket full of smartphones Different perspective: 1) Buy mobile bots 2) Spoof GPS location 3) Control traffic

    Poništi
  6. 2. velj
    Poništi
  7. proslijedio/la je Tweet
    2. velj

    This is how we start the week! What about you? BsidesTLV 2020 CFP is open Submit and share.

    Poništi
  8. 2. velj
    Poništi
  9. proslijedio/la je Tweet

    I found a new place to think about malware.

    Poništi
  10. proslijedio/la je Tweet
    30. sij

    What top 10 vulnerabilities should you be aware of in 2020? We break down each one in our latest blog. Learn more here:

    Poništi
  11. proslijedio/la je Tweet
    29. sij
    Poništi
  12. proslijedio/la je Tweet
    29. sij

    sample wolf wolf wolf wolf version with low detection rate: hash 6/70 hash: 6a0faa9f71c4c0b9c8d1d45158592c22eaa88b612a4e5ed4418a69c52a30f1b0 dropped: ԳայլըсԳայլըПФрКЕыԳայլը.exe same Trickbot EXIF Metadata:

    Prikaži ovu nit
    Poništi
  13. 29. sij
    Poništi
  14. 28. sij

    The malware author decided to be funny 🤣

    Poništi
  15. proslijedio/la je Tweet

    macOS 10.15.3 is out, fixing a bunch of nasty (remote) bugs! 🍎🐛 ...go patch! 🛡️

    Poništi
  16. 28. sij
    Poništi
  17. 28. sij

    Used on macOS for research purposes for a while, interesting that it has a Windows version 🧐

    Poništi
  18. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    27. sij
    Poništi
  20. proslijedio/la je Tweet
    26. sij
    Poništi
  21. 26. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·