reenz0h

@Sektor7Net

"Vincit qui se vincit" Publilius Syrus Offensive Research & Development/Training, Cyber domain, and more... Organizer.

Vrijeme pridruživanja: travanj 2019.

Tweetovi

Blokirali ste korisnika/cu @Sektor7Net

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Sektor7Net

  1. Prikvačeni tweet
    4. lip 2019.

    MacGyver-style Pure In-Memory (Shell)Code Injection In Linux Userland, with no special tools needed

    Poništi
  2. prije 7 sati

    TuxResponse - incident response automation for Linux systems.

    Poništi
  3. prije 11 sati

    Synchronizing IDA decompiled and disassembled code views with dsync plugin.

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    Finally! registration is now open and the agenda is announced. Check the agenda: Our speakers: Register here: Early Bird only until Feb 16. The number of tickets is limited, so don't wait!

    Poništi
  5. 31. sij
    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Wanna hear talking about it? Come to . Agenda will be published soon!

    Poništi
  7. 26. sij

    How much would you be willing to pay for an online course about advanced cybersec topics like attacking routing protocols, backdooring routers, bypassing ML algos?

    Poništi
  8. proslijedio/la je Tweet
    20. sij

    “Hack like it’s 2077 — Presenting ꓘamerka mobile”

    Poništi
  9. proslijedio/la je Tweet
    15. sij

    at 2020! Hack the Planet with ꓘamerka - Research on exposed devices Full agenda in the next few weeks! We'll keep you posted :)

    Poništi
  10. proslijedio/la je Tweet
    14. sij

    at 2020! Discovering and Clustering Malicious Files Based on PE Export DLL Name Artifacts More info soon!

    Poništi
  11. proslijedio/la je Tweet
    13. sij

    at 2020! Hidden Link Between TrickBot "Anchor" & North Korea "Lazarus” State Sponsored Group, or How North Korean Hackers are Working with Eastern European Cybercriminals

    Poništi
  12. 17. pro 2019.

    Math, coding and music combined. The Art it is. Nice piece !

    Poništi
  13. 15. pro 2019.
    Prikaži ovu nit
    Poništi
  14. 13. pro 2019.

    Hooking ZwOpenProcess(), GetExtendedTcpTable() and GetRTTAndHopCount() in unnamed AV process to hide malicious payloads. Userland rootkits are alive and kicking :)

    Poništi
  15. 12. pro 2019.
    Poništi
  16. 12. pro 2019.

    Pentesters thinking they are nation-state actors...

    Poništi
  17. 26. stu 2019.
    Poništi
  18. 26. stu 2019.

    How do you know that your operation was compromised? Do you want to increase your offensive situational awareness? So listen to and talking about outstanding project.

    Poništi
  19. 22. stu 2019.

    It was great having you on the stage, buddy! Your talk was a blast. Thanks for backup!

    Poništi
  20. 19. stu 2019.

    From Medium integrity to SYSTEM with clicky-clicky old-school hack. Love it!

    Poništi
  21. 19. stu 2019.

    If you seek a small IT sec conference with great content and tremendous speakers willing to share their research from both blue and red sides of the coin, submit today! You will not regret.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·