Tweetovi

Blokirali ste korisnika/cu @PhuQui1998

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @PhuQui1998

  1. proslijedio/la je Tweet
    3. velj
    Poništi
  2. proslijedio/la je Tweet
    4. velj

    A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo

    Poništi
  3. proslijedio/la je Tweet

    Yet Another Sudo ! When 'pwfeedback' is enabled, a new Sudo bug could let low privileged & users (or malicious programs) execute arbitrary commands with 'root' privileges. Details for CVE-2019-18634 ➤

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  5. proslijedio/la je Tweet
    1. velj
    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Code injection in Workflows leading to SharePoint RCE (Analysis of CVE-2020-0646)

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    2020-01-29: [OSINT] Deep " Activity Report" by FINSEC 🇰🇷 🤔Weird phrasing on "Zeus" group and division into "Carbanak" (Anunak) and . 🙏Also please remember != != !=

    Poništi
  8. proslijedio/la je Tweet
    30. sij
    Poništi
  9. proslijedio/la je Tweet
    30. sij
    Poništi
  10. proslijedio/la je Tweet
    30. sij
    Poništi
  11. proslijedio/la je Tweet

    🔥 CVE-2020-7247 A new critical vulnerability in the OpenSMTPD mail daemon could let remote attackers take complete control over vulnerable OpenBSD and based e-mail servers by sending specially crafted SMTP messages. Read: Patch & PoC released.

    Poništi
  12. proslijedio/la je Tweet

    Great News! "Off-Facebook Activity" tool is now available to everyone. Learn how to find which 3rd-party 'websites you visited' or 'apps you used' have shared your activity data with and also how to delete it. Read:

    Poništi
  13. proslijedio/la je Tweet

    CacheOut (CVE-2020-0549) — Researchers find a new speculative execution in CPUs that could let attackers leak targeted sensitive data from OS kernel, co-resident virtual machines, and even from Intel's secured SGX enclave. Details:

    Poništi
  14. proslijedio/la je Tweet
    29. sij

    GitHub - Xh4H/Satellian-CVE-2020-7980: PoC script that shows RCE vulnerability over Intellian Satellite controller -

    Poništi
  15. proslijedio/la je Tweet
    28. sij

    CAPEv2 : Malware Configuration And Payload Extraction : Details : BoomBox : Automatic deployment of Cuckoo Sandbox malware lab using Packer and Vagrant :

    Poništi
  16. proslijedio/la je Tweet
    28. sij

    hacker-roadmap : A guide for amateurs pen testers and a collection of hacking tools, resources and references to practice ethical hacking, pen testing and web security : cc

    Poništi
  17. proslijedio/la je Tweet
    28. sij

    x86-manpages : x86 and amd64 instruction reference manual pages : cc x86 and amd64 instruction reference : (Last updated 2019-05-30)

    Poništi
  18. proslijedio/la je Tweet
    28. sij
    Poništi
  19. proslijedio/la je Tweet
    27. sij
    Poništi
  20. proslijedio/la je Tweet
    26. sij
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·