Varun V Hirve  

@VarunHirve

Cyber Security Enthusiast.

Pune, INDIA
Vrijeme pridruživanja: travanj 2012.

Tweetovi

Blokirali ste korisnika/cu @VarunHirve

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @VarunHirve

  1. proslijedio/la je Tweet
    4. velj

    A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.

    Poništi
  2. proslijedio/la je Tweet
    2. velj
    Poništi
  3. proslijedio/la je Tweet
    1. velj
    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Research from shows that developed to abuse the Encrypting File System () would be able to execute and go undetected by most AV.

    Poništi
  5. proslijedio/la je Tweet
    26. sij

    Log Sources - ordered by priority - with ratings in different categories - personal and highly subjective assessment - from my most recent slide deck on low hanging fruits in security monitoring

    Poništi
  6. proslijedio/la je Tweet
    26. sij

    Online hash checker for Virustotal and other services

    Poništi
  7. proslijedio/la je Tweet
    26. sij
    Poništi
  8. proslijedio/la je Tweet
    17. sij

    Here's updated Splunk syntax that should flag anything written with the Audit CVE function, now or in the future: index=wineventlog SourceName="Microsoft-Windows-Audit-CVE" | rex field=Message "(?m)(?<Alert_Info>.*)" | table _time host EventCode SourceName Alert_Info

    Poništi
  9. proslijedio/la je Tweet
    19. sij
    Poništi
  10. proslijedio/la je Tweet
    14. sij

    Richard Davis brings a wealth of knowledge to the classroom from his almost 25 years in IT and 11+ years in information security. Learn more about :

    Poništi
  11. proslijedio/la je Tweet
    12. sij
    Poništi
  12. proslijedio/la je Tweet
    13. sij

    Here’s the first new 13Cubed episode for 2020. Email Header Analysis and Forensic Investigation is now available. Special thanks to for lending his technical expertise. Please enjoy, and RT!

    Poništi
  13. proslijedio/la je Tweet
    10. sij

    Thanks and for the good time! If you want to play with the MFT comparison tool as featured, you can find it here: Special shout-out to . He makes cool things possible.

    Poništi
  14. proslijedio/la je Tweet
    11. sij

    Latest campaigns leveraging as landing pages as they are hosted by and appear legitimate. Via .

    Poništi
  15. proslijedio/la je Tweet
    8. sij

    tip - Best career thing I did: learning cloud forensics. Do it for free like this: 1. Start here to learn about the cloud. 2. Read the cloud Forensic white papers on website 3. Get a free account and practice

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet

    If you are interested in potential commands used by APT33 and APT34 (Iranian) make sure you have detections around these: Here's an example:

    Poništi
  17. proslijedio/la je Tweet
    5. sij

    MagicMirror : It allows you to convert your hallway or bathroom mirror into your personal assistant (not to forget w/ Raspberry Pi) : cc Building an IoT Magic Mirror with Hosted Web Apps and Windows 10 :

    Poništi
  18. proslijedio/la je Tweet
    1. sij
    Poništi
  19. proslijedio/la je Tweet
    5. sij
    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    4. sij

    Excellent introduction to the implementation of Windows Event Logs and why they can be missing critical information. Michael Cohen includes an open source Velociraptor parser as a solution.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·