Andre Marques

@_zc00l

Developer of Insecurity. Former Law student went to hacking. Working in Red Team for Morphus.

Vrijeme pridruživanja: travanj 2018.

Tweetovi

Blokirali ste korisnika/cu @_zc00l

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_zc00l

  1. 13. ruj 2019.

    New post. Coding a powershell bind shell that bypass that troublesome Windows Firewall pop-up when binding tcp sockets! No need for Local admin either.

    Poništi
  2. proslijedio/la je Tweet
    5. ruj 2019.

    You can now find in the repository: - JSParser by - Shellpop by - arsenic by Thanks those devs for their amazing tools! Happy hacking!

    Poništi
  3. 11. lip 2019.

    Now that it's no longer a 0day, check my post about "Coding a reliable CVE-2019-0841 bypass" to craft a LPE exploit that works for all versions of Microsoft Edge in Windows 10.

    Poništi
  4. proslijedio/la je Tweet
    13. svi 2019.

    AD Security Event IDs: Lockouts: 4740 User Logon: 4624 Group Changes: 4728, 4729, 4732, 4733, 4756, 4757, 4761, 4762 Group Creation/Del: 4727, 4730, 4731, 4734, 4759, 4760, 4754, 4758 GP Change: 5136, 5137, 5141 Log Clear: 1102, 104

    Prikaži ovu nit
    Poništi
  5. 8. velj 2019.
    Poništi
  6. 12. sij 2019.
    Poništi
  7. 11. pro 2018.

    Pwning computers with Telegram Bot API. This is a post where I describe my experience developing a fun weekend-project that I named "Telepreter".

    Poništi
  8. 4. pro 2018.

    Finally! Time to change strategy. C++ is going to be "the way"?

    Poništi
  9. 8. stu 2018.

    New blog post: "Oh no! AMSI blocked the AMSI Bypass! What Now?" It teaches how to circumvent this and posterior AMSI blocks to our AMSI bypass script.

    Poništi
  10. proslijedio/la je Tweet
    6. stu 2018.

    New Release: Magic Unicorn 3.5.1 - adds AMSI_BYPASS mode which uses the technique described here: to disable AMSI as part of the payload in Unicorn. Also added new features (print_decoded and more).

    Poništi
  11. 6. stu 2018.

    Check my latest blog post about recovering domain credentials from WPA2 Enterprise on a compromised workstation!

    Poništi
  12. proslijedio/la je Tweet
    2. stu 2018.

    Explicando y bypasseando protecciones de PowerShell con técnicas de y

    Poništi
  13. 1. stu 2018.

    You've been playing with it a lot these days, huh? Great work, , as always.

    Poništi
  14. 31. lis 2018.

    Don't forget to check my lastest blog post: How to bypass UAC in newer Windows versions! A research based on the work of

    Poništi
  15. proslijedio/la je Tweet
    31. lis 2018.
    Odgovor korisnicima

    I just posted a Part 2 (and also had to update the slug for the original post, so that link won't work now). Use the tag:

    Poništi
  16. proslijedio/la je Tweet
    31. lis 2018.
    Poništi
  17. 28. lis 2018.

    Hi guys. New post in my Blog. This time is for bypassing AMSI and executing any malicious powershell script from an attacker perspective.

    Poništi
  18. 27. lis 2018.

    Hey! I have concluded my series of Windows Impersonation posts, check the last one.

    Poništi
  19. 17. lis 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·