Ranelz

@Ranelzz

InfoSec researcher, Malware Reversing and Analysis, ExploitDev, red teaming, unemployed, Exposing your botnet.

Ring 0
Vrijeme pridruživanja: kolovoz 2018.

Tweetovi

Blokirali ste korisnika/cu @Ranelzz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Ranelzz

  1. Prikvačeni tweet
    29. kol 2018.

    What I do, in a nutshell.

    Poništi
  2. proslijedio/la je Tweet
    23. sij

    Even with end to end encryption, metadata matters

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    29. sij

    I wrote about the Dazzle Club's work, privately owned public spaces, and the experience of being constantly watched for

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    1. velj

    Hey - Your product is shit and your company is shit. Not only is what you’re trying to do hurting society, but your delivery of it is completely worthless. Analyze this: 🖕

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    31. sij
    Poništi
  6. 30. sij
    Poništi
  7. proslijedio/la je Tweet
    28. sij

    Our new report out now: "Stopping the Press: Journalist Targeted by Saudi-linked Pegasus Spyware Operator".

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  10. proslijedio/la je Tweet
    15. sij
    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    Watching attackers with the Citrix ADC honeypot is interesting, so far they don’t know what to do post exploitation (it runs FreeBSD). I’ve had several attackers, they can’t even download their coin miners (and they have Linux binaries).

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    4. sij

    When China and Iran see eachother after hacking the North American power grid

    Poništi
  13. 25. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    Odgovor korisniku/ci
    Poništi
  15. proslijedio/la je Tweet

    So weird how this tech, seemingly used only by law abiding governments, always seems to end up being used by not so nice regimes... Mind boggling, I guess a better dropper tailored to specific ops is in the roadmap

    Poništi
  16. proslijedio/la je Tweet

    *border agent takes my phone to the back room and unlocks it with a $750,000 israeli 0day hacking device* Agent: sir your phone contains thousands of pikachu memes and nothing else Me: how u know that

    Poništi
  17. 21. pro 2019.
    Poništi
  18. proslijedio/la je Tweet
    15. pro 2019.

    the FORBIDDEN ctf tactics the pros DONT want you to know!

    Prikaži ovu nit
    Poništi
  19. 11. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    9. pro 2019.

    Criminals don’t give a fuck if you’re ISO 27001 compliant

    Poništi
  21. proslijedio/la je Tweet
    1. lis 2019.

    October 1st 2019 marks the beginning of my 7th year in prison.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·