Tweetovi

Blokirali ste korisnika/cu @ReleasePreview

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ReleasePreview

  1. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  2. proslijedio/la je Tweet
    26. sij

    Windows / Linux Local Privilege Escalation Workshop (Materials included !) 🥳

    Poništi
  3. proslijedio/la je Tweet
    23. sij

    Microsoft have released an open source tool to analyze source code for vulnerabilities in almost any modern language:

    Poništi
  4. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  5. 18. sij

    Oh nice, RCE in Internet Explorer: ... good timing with the ECC bug. Also anyone requiring users to use IE to access Citrix?

    Poništi
  6. proslijedio/la je Tweet
    16. sij

    If you’re tired of hearing about crypto32, elliptic curves, and other CVE-2020-0601 shenanigans, have a read over our new blog post on Windows’ Intel CET implementation in the face of SetThreadContext and NtContinue. Come for the exploit mitigation, stay for the XState Internals.

    Poništi
  7. proslijedio/la je Tweet
    14. sij

    Hey, new upload to Windows-Insight - the Windows Telemetry ETW Monitor framework: The framework monitors and reports on ETW (Event Tracing for Windows) activities for providing data to Windows Telemetry. Works on Windows 10, version 1909. [Thread: 1/4]

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    13. sij
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    13. sij

    Check our new post: APT27 ZxShell RootKit module updates

    Poništi
  10. proslijedio/la je Tweet
    27. pro 2019.

    1. I worked with Anna Zaitsev (Berkely postdoc) to study YouTube recommendation radicalization. We painstakingly collected and grouped channels (768) and recommendations (23M) and found that the algo has a deradicalizing influence. Pre-print: 🧵

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    27. pro 2019.

    SharpSploit v1.5 is out! Includes amazing work from , , , , and . Includes: lateral movement over SCM and PSRemoting, an AMSI bypass, CreateProcessWithToken, and DynamicInvoke improvements. 🔥🔥🔥

    Poništi
  12. proslijedio/la je Tweet
    20. pro 2019.

    Sigma2Attack generates ATT&CK navigator heat maps from a set of rules by Pull Request - already merged into master ATT&CK Navigator

    Poništi
  13. proslijedio/la je Tweet
    20. pro 2019.

    Christmas came earlier this year, fresh new release of timesketch with big improvements and fancy new ui!

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    13. pro 2019.

    Finally: Malwoverview 2.0 (in Python 3.x) is available! There're so many news, so it's better to check on the GitHub ;)

    Poništi
  15. proslijedio/la je Tweet
    12. pro 2019.

    Learn how to exploit Symantec Endpoint Protection on all versions of Windows (CVE-2019-12750). Part 2 of this series by delves into a more advanced method of exploitation!

    Poništi
  16. proslijedio/la je Tweet
    11. pro 2019.

    [New blog] Updating adconnectdump - a journey into DPAPI; In which I describe the process of understanding and decrypting the DPAPI encrypted credentials of Azure AD connect. This again enables dumping these credentials via only network calls (as admin).

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    10. pro 2019.

    Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    After stumbling upon c:\windows\system32\runexehelper.exe and some reversing I figured out it can be used to run execs (two conditions: diagtrack_action_output env var needs to be set to a writable directory and runexewithargs_output.txt must not exist there).

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    9. pro 2019.

    Trustwave Principal Consultant, , has announced the release of a new open source tool aimed at aiding Red Team engagements.

    Poništi
  20. proslijedio/la je Tweet
    9. pro 2019.

    We open sourced PathAuditor: a tool for Linux that and I worked on this summer. Tl;dr: you can use it to instrument root daemons and find insecure file access patterns like CVE-2019-3461. Check out the code: Blog post:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·