Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Spy__Grl
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Spy__Grl
-
Mattie Wright proslijedio/la je Tweet
Last year,
@wvuuuuuuuuuuuuu researched and published a command-and-control module for SMB DOUBLEPULSAR. Since then, we've researched and reverse-engineered the RDP version of the implant. Today we're publishing that research and a module for it. Details:https://blog.rapid7.com/2020/02/04/doublepulsar-rce-2-an-rdp-story/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
Analysis of a triple-encrypted AZORult downloader https://i5c.us/3b2v4Jc pic.twitter.com/WawmyF13e1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
It took Kraken Security Labs just 15 minutes to hack both of @trezor’s crypto hardware wallets. Here’s how we did it and what it means if you’re a user:https://blog.kraken.com/post/3662/kraken-identifies-critical-flaw-in-trezor-hardware-wallets …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers https://wrongbaud.github.io/stm-xbox-jtag/ Hope you enjoy! As always ping me with any questions
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
My write up for NSA Codebreaker 2019. This year was designed around Android Apps and Public Key backdoors. This year I was able to complete all eight tasks, along with 3.2% of participants who finished task 1. https://armerj.github.io/CodeBreaker-2019-Overview/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
Eclypsium published new research exposing vulnerabilities to DMA attacks in laptops from HP and Dell. Our principal researchers,
@HackingThings and@jessemichael show that high speed DMA attacks can bypass hardware protections on enterprise devices. http://bit.ly/313EEqN pic.twitter.com/OWhEux8F78
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
So motivated after watching this awesome webinar! Thanks
@ethicalhackerhttps://twitter.com/ethicalhacker/status/1217515716188037121 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
She’s not really a believer in daily stand ups.https://twitter.com/nerdpyle/status/1222211433070333953 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
Learn Reversing/Bin Exploitation: https://www.youtube.com/watch?v=iyAyN3GFM7A&list=PLhixgUqwRTjxglIswKp9mpkfPNfHkzyeN … Practice: https://2019game.picoctf.com/ https://247ctf.com/ Great content about it: https://www.youtube.com/user/GynvaelEN Learn x64 Assembly(MASM): https://www.youtube.com/playlist?list=PLKK11Ligqitg9MOX3-0tFT1Rmh3uJp7kA … Thanks guys <3
@LiveOverflow@gynvael@WhatsACreelPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
Memhunter - Live Hunting Of Code Injection Techniqueshttp://www.kitploit.com/2020/01/memhunter-live-hunting-of-code.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
Good whitepaper about windows 10 secure kernel: "Live forensics on the Windows 10 securekernel (2017)" https://ntnuopen.ntnu.no/ntnu-xmlui/bitstream/handle/11250/2448948/18109_FULLTEXT.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
Binary exploitation exercise write-ups for beginnershttps://mjali.com/category/security/write-ups/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
Reversing XignCode3 Driver – Part 3 – Analyzing dispatch functions : https://niemand.com.ar/2020/01/24/reversing-xigncode3-driver-part-3-analyzing-dispatch-functions/ … Part 2 : Analyzing init functions : https://niemand.com.ar/2020/01/16/reversing-xigncode3-driver-part-2-analyzing-init-functions/ … Part 1 : Identifying the Driver Entry Point : https://niemand.com.ar/2020/01/08/reversing-xigncode3-driver-part-1-identifying-the-driver-entry-point/ … cc
@niemand_secHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!pic.twitter.com/FekupjS6qG
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
For anyone reversing or researching AES, here is a repo with notes, reference links and compiled executables with corresponding PDBs. I hope it is helpful.https://github.com/alexander-hanel/asm-examples/tree/master/AES …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
Malware Samples : Free Malware Sample Sources for Researchers : https://zeltser.com/malware-sample-sources/ … https://github.com/fabrimagic72/malware-samples … Specialized Honeypots for SSH, Web and Malware Attacks : https://zeltser.com/honeypots-for-malware-ssh-web-attacks/ … cc
@lennyzeltserhttps://github.com/OrganizedMayhem/Malware_Samples …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
Learn to write your first OS kernel (minimalist kernel) : https://github.com/arjun024/mkernel … Kernels 101 – Let’s write a Kernel : https://arjunsreedharan.org/post/82710718100/kernels-101-lets-write-a-kernel … cc
@Arjun024Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
My analysis of Remote Desktop Gateway RCE bugs CVE-2020-0609 & CVE-2020-0610 is up.https://twitter.com/kryptoslogic/status/1218323686761037824 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
"Analyzing Modern Malware Techniques - Part 1" by
@danusminimushttps://0x00sec.org/t/analyzing-modern-malware-techniques-part-1/18663 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Mattie Wright proslijedio/la je Tweet
Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL"
Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)
https://repnz.github.io/posts/practical-reverse-engineering/dumping-dpc-queues/ …pic.twitter.com/3lguXVoMAF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.