Tweetovi

Blokirali ste korisnika/cu @_dead_beef_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_dead_beef_

  1. proslijedio/la je Tweet
    10. ruj 2019.

    CURRYFINGER quickly and effectively identifies the real hosts behind CDN networks like CloudFlare - and outperforms existing tools. Find out how to use it; . Or see it in action against the incumbent tool; .

    Poništi
  2. proslijedio/la je Tweet
    14. ruj 2019.
    Poništi
  3. proslijedio/la je Tweet
    13. ruj 2019.

    New post. Coding a powershell bind shell that bypass that troublesome Windows Firewall pop-up when binding tcp sockets! No need for Local admin either.

    Poništi
  4. proslijedio/la je Tweet
    11. svi 2019.

    Security Analyst Workshop Slides from a workshop that I gave in March this year > contains a collection of services & tools for level 1 & 2 analysts

    Poništi
  5. proslijedio/la je Tweet
    1. tra 2019.

    The recording of my AD talk at is now online! If you want to learn about Azure AD account takeover, AD Sync password extraction, privilege escalations and SSO weaknesses, you can watch the full talk on YT:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    24. ožu 2019.

    How S3 Buckets Become Public, and the Fastest Way to Find Yours (DisruptOps)

    Poništi
  7. proslijedio/la je Tweet
    23. ožu 2019.
    Poništi
  8. proslijedio/la je Tweet
    Poništi
  9. proslijedio/la je Tweet
    24. ožu 2019.

    Working on another blog post on , with some cool new Targets & Modules for 's KAPE. I challenged myself to solve the 2018 Unofficial DEFCON DFIR CTF (by & ) using only KAPE. Wish me luck.

    Poništi
  10. proslijedio/la je Tweet
    21. ožu 2019.

    A C# tool for computer object takeover through msDS-AllowedToActOnBehalfOfOtherIdentity based on the research by . Credits also to for his great post and for his Powermad tool on which I relied.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    Poništi
  12. proslijedio/la je Tweet
    24. ožu 2019.

    My solution for 0ctf/tcf 2019 Qual (applepie, babyheap2019, scanner,babyaegis)

    Poništi
  13. proslijedio/la je Tweet
    22. velj 2019.

    New blog post: I uploaded a beginner friendly guide on pulling network indicators from a maldoc.

    Poništi
  14. proslijedio/la je Tweet
    24. ožu 2019.
    Poništi
  15. proslijedio/la je Tweet
    25. ožu 2019.
    Poništi
  16. proslijedio/la je Tweet
    25. ožu 2019.

    Instantbox : Spins up temporary Linux systems with webshell access from a browser :

    Poništi
  17. proslijedio/la je Tweet
    25. ožu 2019.

    Finding The Real Origin IPs Hiding Behind CloudFlare or Tor : cc

    Poništi
  18. proslijedio/la je Tweet
    25. ožu 2019.

    Beagle : An incident response and digital forensics tool which transforms security logs and data into graphs :

    Poništi
  19. proslijedio/la je Tweet
    24. ožu 2019.
    Poništi
  20. proslijedio/la je Tweet
    24. ožu 2019.

    with malicious + MS Access - auto prompt the user to execute the payload. Great technique from :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·