Ѻṧαη∂α      

@OsandaMalith

You will always be fond of me. I represent to you all the sins you never had the courage to commit.

Vrijeme pridruživanja: srpanj 2013.

Tweetovi

Blokirali ste korisnika/cu @OsandaMalith

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @OsandaMalith

  1. Prikvačeni tweet

    It's my first time after all these years I won Minesweeper :)

    Poništi
  2. Exploiting Format Strings in Windows

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  4. proslijedio/la je Tweet

    I created a pixel perfect Nyan Cat animation in JavaScript almost 10 years ago. The original gif is 30K while this version is exactly 1K, a reduction in size of almost 97%. If u like JavaScript compression/obfuscation and reverse engineering, have a look!

    Prikaži ovu nit
    Poništi
  5. Poništi
  6. Poništi
  7. proslijedio/la je Tweet
    29. sij

    WAFW00F v2.1 is just out! Got a json/csv/txt file having a list of sites which needs to be tested for WAFs? Want a decent output in json/csv? We got you covered! wafw00f -i file.{json|csv|txt} -o file.{txt|csv|json}

    Poništi
  8. Alternatives to Extract Tables and Columns from MySQL and MariaDB

    Poništi
  9. Poništi
  10. Do you need the column names to extract data in MySQL and MariaDB? Not really. Check out my research on new tables I found to extract table names.

    Poništi
  11. MiniDumpWriteDump via Faultrep!CreateMinidump

    Poništi
  12. I just published Unloading the Sysmon Minifilter Driver

    Poništi
  13. If you know tomorrow you won't participate today.

    Poništi
  14. On LinkedIn, the new trend is posting job descriptions as a Red Teaming position and most of the time it's all about pentesting web apps. Anything is ruined when non-technical recruiters catch a word.

    Poništi
  15. Written by A "real" developer.

    Poništi
  16. proslijedio/la je Tweet
    25. sij

    Just finished the writeup for my learning process to replicate the CVE-2019-19470, I also public the source code for exploit and a Masquerade-PEB C#. Hope you enjoy!

    Poništi
  17. proslijedio/la je Tweet
    23. sij

    "ondragend" event seems to bypass certain WAFs <p ondragend=[1].map(prompt) draggable="true">dragMe</p> cc

    Poništi
  18. proslijedio/la je Tweet
    23. sij

    I wrote a secret scanner tool and published it under my employer's GitHub org. Since I don't have much Twitter reach I appreciate any RTs! It currently will scrape Git, S3, and GDocs for secrets, and written in Rust for high performance.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    21. sij
    Odgovor korisnicima
    Poništi
  20. proslijedio/la je Tweet
    20. sij

    First blog post: Unauthorized Google Maps API Key Usage Cases, and Why You Need to Care

    Poništi
  21. proslijedio/la je Tweet
    20. sij

    The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr as Hypervisor From Scratch could never have existed without his help and to Alex for patiently answering my questions.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·