Odisseus

@_odisseus

Independent Security Researcher, who loves the story of "the legendary Greek hero" (cit.)

Vrijeme pridruživanja: srpanj 2013.

Tweetovi

Blokirali ste korisnika/cu @_odisseus

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_odisseus

  1. Prikvačeni tweet
    22. sij

    How to develop your own custom (step by step) that establishes a shell through the target’s browser. Re-purposing ’s bind , modifying BeEF’s (0.4.7.0-alpha) backend and leveraging on . Via

    Poništi
  2. proslijedio/la je Tweet
    Poništi
  3. proslijedio/la je Tweet
    5. velj

    Cyber range, la piattaforma virtuale che prepara alla difesa dalle minacce cyber, nello spazio vendor Aizoon con Danilo Massa CTO Cyber Security Division e Giovanni Cerrato, project manager.

    Poništi
  4. 6. velj

    Cisco Discovery Protocol (CDP) enabled devices are vulnerable to Denial-of-Service (DoS) and Remote Code Execution (RCE) 👏👏👏 CVE-2020-3110 CVE-2020-3111 CVE-2020-3118 CVE-2020-3119 CVE-2020-3120 Note: Hacking Video:

    , , i još njih 6
    Poništi
  5. 6. velj

    FBI downloaded CIA’s Hacking Tools Using Starbuck’s WiFi "So, anytime actions on the internet are traceable as well as downloads, and we didn’t want to use an FBI system. ... which could then be traced back to us"

    , , i još njih 7
    Poništi
  6. proslijedio/la je Tweet
    5. velj
    Poništi
  7. proslijedio/la je Tweet
    5. velj
    Poništi
  8. proslijedio/la je Tweet
    3. velj

    again in the wild Threat Actor : Evolution's International Hack team Payload 𝗟𝗜𝗡𝗞: hxxp://37.49.231.190/kc-botnet/x86_64 𝗪𝗛𝗢𝗜𝗦: NL / ASN: AS209299 VITOX-TELECOM Currently 𝗔𝗰𝘁𝗶𝘃𝗲 cc:

    Poništi
  9. proslijedio/la je Tweet

    APT + Ransomware = $$$ operators are partnering with specialists who use techniques to provide stealthy infiltration and network-wide encryption capabilities in

    Poništi
  10. proslijedio/la je Tweet
    24. sij

    Update .Linux Exploit Target: 𝗜𝗣: 188.166.36.43 cnc: 50717 Payload 𝗟𝗜𝗡𝗞: http://188.166.36.43/serviceDATAS000541800/s0s13.x86 | http://188.166.36.43:80/ssh-updater.sh cc:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    27. sij

    INTERPOL supports arrest of cybercriminals targeting online shopping websites <-- web-commerce compromise + injected jscript + card/PII skimming

    Poništi
  12. proslijedio/la je Tweet
    23. sij

    .Linux Targeting Exploit Target : 𝗜𝗣: 45.148.10.181 Payload 𝗟𝗜𝗡𝗞: http://45.148.10.181/ssh-updater.sh | hxxp://45.148.10.181/gpon443 | hxxp://45.148.10.181/thinkphp Currently 𝗔𝗰𝘁𝗶𝘃𝗲

    , , i još njih 4
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    22. sij

    Targeting 𝗜𝗣: 217.182.38.147 Payload 𝗟𝗜𝗡𝗞: hxxp://217.182.38.147/telnet.sh CnC Port: TCP/1791 𝗪𝗛𝗢𝗜𝗦: Country : FR AS16276 OVH | Currently 𝗔𝗰𝘁𝗶𝘃𝗲 CC:

    Poništi
  14. proslijedio/la je Tweet
    21. sij

    I am so proud of dev team ! It was able to implement the catch technique on our Hunter in no time ! To know more on that new feature please visit : Feel free to use it:

    , , i još njih 6
    Poništi
  15. proslijedio/la je Tweet
    21. sij

    orgoglioso di essere con gli amici di USIGRai per parlare di Cybersecurity con e

    Poništi
  16. proslijedio/la je Tweet
    Poništi
  17. 20. sij

    Interesting to see Malware Hunter - a free sandbox-based analysis - about the last known . Please check: - Behaviour Analysis - Static Analysis - Network Analysis cc:

    Poništi
  18. proslijedio/la je Tweet

    Because I prefer C, little POC to create your own EC alternative keys > With a lots of keys included in the release.

    Poništi
  19. 20. sij

    NEMTY 2.5 works perfectly inside a VMware virtual machine. No evasion techniques found at the moment. Find an example here, thank you . Thanks to:

    Poništi
  20. proslijedio/la je Tweet

    A month after disclosing existence of a critical RCE vulnerability (CVE-2019-19781) in ADC & Gateway software—also under active ATTACKS—the company finally today released the 1st batch of security patches for versions 11.1 & 12.0 ➤

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·