Cyber.STX

@THB_STX

Dead men tell no tales. BlackArch contributor. OWASP Amass contributor.

127.0.0.1
Vrijeme pridruživanja: srpanj 2009.

Tweetovi

Blokirali ste korisnika/cu @THB_STX

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @THB_STX

  1. proslijedio/la je Tweet
    prije 13 sati

    In November 2015, we designed (in a cafe in Bruxelles) a simple JSON format to solve the use of unstructured tags in MISP (mainly for the TLP classification). Today, we have 112 public taxonomies to support a wide range of use-cases in sharing communities.

    Poništi
  2. proslijedio/la je Tweet
    prije 3 sata

    Do your sock puppet user pics still look like stock ones? Try this unique face generator! It works on the basis of AI and the pics really seem authentic. We used a few reverse image search engines to verify some and the results were impressive

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    prije 2 sata

    I had some fun exploiting LDAP this week. I'm far from an LDAP expert, so please, bear with me as I try to make some sense of how I went to went from what seemed to be near complete lockdown to owning the domain.

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    The DNS service is essential for browsing the 🌐 What about the vulnerabilities of this service? 🎯 I made an that presents an attack called DNS Poisoning. Follow for more about

    Poništi
  5. proslijedio/la je Tweet
    prije 1 sat

    And yes, you can totally run this in the BYOI Posh implant as detailed here ( put it in source[.]boo 🤙)

    Poništi
  6. proslijedio/la je Tweet
    prije 21 sat

    Teach analysts how to think. Don't just hand them a runbook. What does that look like? Meet OSCAR. Not just a grouch, but also a pretty good investigative methodology: (O)rient (S)trategize (C)ollect (A)nalyze (R)ecord findings OSCAR.

    Poništi
  7. proslijedio/la je Tweet
    prije 2 sata
    Poništi
  8. proslijedio/la je Tweet
    prije 17 sati
    Poništi
  9. proslijedio/la je Tweet
    prije 10 sati

    Gaining system access is only the beginning. Once inside a system, the real fun begins & attackers will use "Evasion & Obfuscation Techniques" - via

    Poništi
  10. proslijedio/la je Tweet
    prije 11 sati

    From CSRF to RCE and WordPress-site takeover: CVE-2020-8417 - WPSec

    Poništi
  11. proslijedio/la je Tweet
    prije 7 sati
    Poništi
  12. proslijedio/la je Tweet
    prije 2 sata

    Turning a hotel key card into a stolen credit card : cc

    Poništi
  13. proslijedio/la je Tweet
    prije 3 sata

    The thread is really too long to be read on Twitter now (it was not planned). I will write and publish an article about it on my website in the coming days.

    Poništi
  14. proslijedio/la je Tweet

    Привет Vladivostok. Not long until we show you the tsunami ravaged harbours, ruined industrial buildings, and crumbling residential districts in - Sam's Story. Until then, check out these gorgeous screenshots.

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  15. proslijedio/la je Tweet
    prije 19 sati
    Poništi
  16. proslijedio/la je Tweet
    prije 13 sati

    The Dichotomies of Disinformation is now part of the standard taxonomies thanks to for the contributions (especially the disinformation topic and to fight this with the MISP platform).

    Poništi
  17. proslijedio/la je Tweet
    prije 3 sata
    Poništi
  18. proslijedio/la je Tweet
    prije 3 sata
    Poništi
  19. proslijedio/la je Tweet
    prije 2 sata

    PolyShell - a script that's simultaneously valid in Bash, Windows Batch, and PowerShell

    Poništi
  20. proslijedio/la je Tweet

    WinPwnage. Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·