Tweetovi

Blokirali ste korisnika/cu @RandoriSec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @RandoriSec

  1. Prikvačeni tweet
    24. sij
    Poništi
  2. prije 16 sati

    Here is an example: # jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore /root/.android/debug.keys -storepass android myapk.apk androiddebugkey Find more details about signing Android apps at: 2/2

    Prikaži ovu nit
    Poništi
  3. prije 16 sati

    Don’t want to create a keystore to sign your Android app? You can use the debug keystore provided by the Android SDK tools. The file is stored at /.android/debug.keystore. 1/2 Want to learn more? Check out our Mobile Hacking Training

    Prikaži ovu nit
    Poništi
  4. 30. sij

    You want to practice and sharpen your weapons for mobile hacking ? Here are our next workshops (free) and trainings: And if you want to have a preview of the covered subjects, we are going to tweet in February.

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    Hurry up! You have until Friday to enjoy the early bird price (2599€ instead of 3199€) for our Mobile Hacking Training at in Amsterdam (April 20-22)

    Poništi
  6. 28. sij

    Premier FIC pour nous cette année ! Si vous voulez nous rencontrer, demandez !

    Poništi
  7. proslijedio/la je Tweet
    17. sij

    Do you want to know more about Abusing Google Play Billing? Check out the presentation of Guillaume Lopes at . ;) 

    Poništi
  8. 20. sij
    Poništi
  9. proslijedio/la je Tweet
    17. sij
    Poništi
  10. 9. sij
    Poništi
  11. proslijedio/la je Tweet
    8. sij

    DeepSec 2020 has booted. We're back and have quite some plans for the new year (which looks and feels exactly like the old one). Welcome to the Age Where Port Scans are Cyber Attacks!

    Poništi
  12. 7. sij
    Poništi
  13. proslijedio/la je Tweet
    4. sij

    New year, lot of new things: - leHACK will last 2 full days: Friday 26 and Saturday 27 - CfP is open: - a little chall for the road:

    Poništi
  14. proslijedio/la je Tweet
    3. sij

    Given recent developments, re-upping our statement from the summer. Bottom line: time to brush up on Iranian TTPs and pay close attention to your critical systems, particularly ICS. Make sure you’re also watching third party accesses!

    Prikaži ovu nit
    Poništi
  15. 2. sij

    Happy New Year / Bonne Année 2020 ! 2019 was intense: 7 new warriors joined us, we talked & gave trainings in 4 conferences, sponsored 3 others + a few open-source projects. We'll keep up the pace to help our customers to be safe and contribute to the community the best we can

    Poništi
  16. proslijedio/la je Tweet
    30. pro 2019.

    One month left for the early-bird price (you save 600€) !

    Poništi
  17. 19. pro 2019.

    Thx for the package :) Very glad to be one of the Mobile Security Testing Guide sponsors. Get your ebook here (and donate if you can):

    Poništi
  18. proslijedio/la je Tweet
    18. pro 2019.

    (CDI) RandoriSec Business Hacker ! (ou plus sobrement « Ingénieur Commercial Cybersécurité »…)

    Poništi
  19. proslijedio/la je Tweet

    Récap' de avec en speakers B.Barbier, M.Lepargneux, , O.Grall, D.Spella, , A.Lenoir, , D.Le Goff, , B.Roussely, , C.Charlot

    Poništi
  20. 12. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·