At0m

@addContent

Computer freak ||Malloy|| 🍻 it all 🐻

Kenya
Vrijeme pridruživanja: svibanj 2012.

Tweetovi

Blokirali ste korisnika/cu @addContent

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @addContent

  1. proslijedio/la je Tweet
    prije 4 sata

    PolyShell - a script that's simultaneously valid in Bash, Windows Batch, and PowerShell

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    Introduction to mobile network intrusions from a mobile phone by Sébastien Dudek

    Poništi
  3. proslijedio/la je Tweet

    WinPwnage. Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques

    Poništi
  4. proslijedio/la je Tweet
    prije 7 sati

    Bloodhound on an ultra wide curved monitor makes you feel like you’re hacking Hollywood Style.

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    Adding a Backdoor to AD in 400 Milliseconds

    Poništi
  6. proslijedio/la je Tweet
    prije 18 sati
    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    prije 6 sati

    Hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources. - you can't read everything 🤣

    Poništi
  8. prije 8 sati
    Poništi
  9. proslijedio/la je Tweet
    3. lip 2017.

    Practical guide to NTLM Relaying in 2017 (A.K.A getting a foothold in under 5 minutes)

    Poništi
  10. proslijedio/la je Tweet

    Errors are red. Kernel panics are blue. This crash dump is a sign, That I’m vulnerable to you ;)

    Poništi
  11. proslijedio/la je Tweet
    4. velj

    x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 Often AVs rely on simple signatures to detect malicious software and I needed a tool in order to confirm this behavior and be able to produce a working bypass. That’s why I wrote x0rro.

    Poništi
  12. proslijedio/la je Tweet
    4. velj

    Android Hacking: How to Embed a Backdoor into a Legitimate APK

    Poništi
  13. proslijedio/la je Tweet
    4. velj

    Python based script for Information Gathering.

    Poništi
  14. proslijedio/la je Tweet
    3. velj

    When testing for SSRF, change the HTTP version from 1.1 to HTTP/0.9 and remove the host header completely. This has worked to bypass several SSRF fixes in the past.

    Poništi
  15. proslijedio/la je Tweet
    4. velj

    New release of the Social-Engineer Toolkit version 8.0.2. Massive bug fixes and improvements.

    Poništi
  16. proslijedio/la je Tweet
    4. velj
    Poništi
  17. proslijedio/la je Tweet
    3. velj

    Yearly reminder to remove PowerShell V2 EVERYWHERE. Doesn’t matter what EDR , logging, witchcraft you have in place. If an attacker has access to the Posh V2 runtime, they can automatically bypass it all.

    Poništi
  18. proslijedio/la je Tweet
    3. velj
    Poništi
  19. proslijedio/la je Tweet
    2. velj

    Still no flags at . HOWEVER, I have so far learned how to: 1) Set up port forwarding, 2) Use 'Terminator' to manage forwards, 3) Set up background sessions in , 4) Access those sessions, 5) Update module targets.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    2. velj

    I added a script to generate the PDF & archive for my Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·