Tweetovi

Blokirali ste korisnika/cu @ShakReiner

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ShakReiner

  1. proslijedio/la je Tweet
    3. lis 2019.

    I wrote a blog entry on how I exploited a vulnerability in Windows Defender using symlinks, CVE-2019-1161

    Poništi
  2. proslijedio/la je Tweet
    24. ruj 2019.

    My recent research in collaboration with has just been published! 🚀 We mapped the Russian APT ecosystem by gathering and classifying thousands of malicious samples to detect and analyze code similarities between them. Check it out @

    Poništi
  3. proslijedio/la je Tweet
    10. ruj 2019.

    New patch Tuesday new CVE, CVE-2019-1142. Abusing dotnet ngen.exe for some EoP.

    Poništi
  4. proslijedio/la je Tweet
    6. ruj 2019.

    We just released Cutter v1.9 on with a HUGE surprise - a full integration of Ghidra decompiler in Cutter! 🥳 Download v1.9 with the Decompiler from For more info, keep reading >>

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    8. srp 2019.

    This made me laugh sooo hard 😂 BEST FESTIVAL EVER!

    Poništi
  6. proslijedio/la je Tweet
    9. tra 2019.

    At 2019, learn how to reverse an RDP attack. of shares how he broke the 3 most popular RDP clients:

    Poništi
  7. proslijedio/la je Tweet
    30. stu 2018.

    What malware has to do with The Legend of Zelda, Scarface, Putin and Cartman? My exhaustive analysis of BackSwap was just published! + Bonus: radare2 () python script to extract and decrypt its shellcode and web-injects! Check it out @

    Poništi
  8. proslijedio/la je Tweet
    18. lip 2018.

    Just published the 2nd part of my analysis of APT33's Dropshot malware! We'll use Cutter () and radare2 to understand Dropshot's Anti-Emulation techniques and will decrypt its payload using Python API. Check it out @

    Poništi
  9. proslijedio/la je Tweet
    21. svi 2018.

    Who said radare2 doesn't have a decent GUI? | Decrypting the encrypted strings of APT33's Dropshot malware using Cutter () and 's Python API. Check it out @

    Poništi
  10. proslijedio/la je Tweet
    27. tra 2018.

    Now it is super easy to convert your IDA IDB to a radare2 initialization script! Just use the improved script and that's all! :) |

    Poništi
  11. proslijedio/la je Tweet
    15. tra 2018.

    Teaser: Static unpacking and string decoding of APT33's Dropshot/StoneDrill malware using Cutter () and radare2 Python API. Soon to be published on .

    Poništi
  12. proslijedio/la je Tweet
    13. ožu 2018.

    It took awhile but it's finally here – Reversing a Self-Modifying Binary with the almighty radare2! Check it out @

    Poništi
  13. proslijedio/la je Tweet
    10. srp 2017.

    So sysrq will if you enable dbg even if kernel dbg isnt connected. kbdhid.sys wont test nt!KdDebuggerNotPresent =\

    Poništi
  14. proslijedio/la je Tweet
    21. stu 2017.

    Our CyberArk Labs team discovers “golden SAML” attack technique:

    Poništi
  15. proslijedio/la je Tweet
    9. lis 2017.
    Poništi
  16. proslijedio/la je Tweet
    28. ruj 2017.

    Our CyberArk Labs team found "strange behavior in the file scanning process of Windows Defender" An Illusion Gap:

    Poništi
  17. proslijedio/la je Tweet
    3. ruj 2017.

    The second part of "A journey into " is finally out - and this time: Exploitation! Check it out @

    Poništi
  18. proslijedio/la je Tweet
    22. lip 2017.

    From CyberArk Labs: New details on new attack technique that bypasses PatchGuard in Windows OS:

    Poništi
  19. proslijedio/la je Tweet
    27. ožu 2017.

    Finally published the first part in a series of articles: A journey into radare2. Check it out @

    Poništi
  20. proslijedio/la je Tweet
    12. lis 2016.

    Megabeets collection of repositories contain malicious samples, domains and more

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·