an0malous

@an0malous_

TGVhcm4gdG8gcXVlc3Rpb24uLi4gdGhlbiBxdWVzdGlvbiB0byBsZWFybi4= Send malware to: malware@decompile-everything.com

255.255.255.255
Vrijeme pridruživanja: kolovoz 2019.

Tweetovi

Blokirali ste korisnika/cu @an0malous_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @an0malous_

  1. Prikvačeni tweet
    15. kol 2019.

    Another choice; another decision to make. Another fractal; splintering and spiraling down.

    Poništi
  2. proslijedio/la je Tweet
    prije 5 sati

    You may not want to wait to patch against these vulnerabilities if you catch my drift. Yes, I know, it seems like every week there is a new SUPER IMPORTANT patching evolution. Just get-r-done! Five high-level flaws patched in Cisco Discovery Protocol

    Poništi
  3. proslijedio/la je Tweet
    5. velj

    Are we going to just ignore the announcement of that will apparently allows for a network switch takeover via malicious crafted CDP packets, chained with vulnerable IP phones that can literally be exploited and intercepted for corporate espionage?

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    4. velj

    Cybercriminals selling access to an MSP for $600? It’s real. Check out how we worked with and to discover, social engineer, and expose an attacker on the dark web.

    Poništi
  5. proslijedio/la je Tweet
    5. velj

    2020-02-05:👾 🔒| 🔩Sunday Build: Jan 19 13:24:28 2020 🆕String Dec for ( i = 0; i < len_byt; ++i ) *(_BYTE *)(i + bin) -=*(_BYTE *)(ind + 4 * (iter % arg_div)); Cert 🔽 h/t MD5:31a8623c16177fb3e4619d05d97335fa

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    4. velj

    I just published my first blog post about Azure Sentinel. ''Integrating Defender ATP with Azure Sentinel to detect Pass-The-Hash and Pass-The-Ticket''

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet

    Send backup from local NAS server to cloud server in case your home server and disks dies same time: rsync -az -Hh --delete --numeric-ids vivek@home.nas-ip:/backups vivek@cloud-server-ip:/backups/mirror.home.nas.server Make sure you set up ssh keys and daily cron job.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    31. sij
    Poništi
  9. proslijedio/la je Tweet
    4. velj
    Poništi
  10. proslijedio/la je Tweet

    C2 Origin 2020/01/31-02/02 1➡️🇺🇸US 84(+7)🔥🔥 2➡️🇦🇷Argentina 20(-4) 2➡️🇩🇪Germany 20(-3) 4⬆️🇦🇺Australia 19(+2) 5⬆️🇯🇵Japan 18(+2) Total 402(+3) by

    Poništi
  11. proslijedio/la je Tweet
    9. stu 2019.

    It's one of those cheap ramen and anime kinda days.

    Poništi
  12. proslijedio/la je Tweet
    24. sij

    Discover security.txt and humans.txt files as you browse the web with our browser extension for Firefox, Chrome, Edge, and (soon) Opera:

    Poništi
  13. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  14. proslijedio/la je Tweet
    11. sij

    My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    10. sij

    Yo hackers! I've built a small website that has some challenges. 🔗 The main challenge for the week is `WW3` All upcoming challenges will be hosted there, so stay tuned :) Would love to know what you guys think. Have fun!

    Poništi
  16. proslijedio/la je Tweet
    3. velj
    Poništi
  17. proslijedio/la je Tweet
    3. velj

    Holy shit. Researcher discovers that TeamViewer stores user passwords encrypted and finds the encryption key and initialization vector in the windows registry

    Poništi
  18. proslijedio/la je Tweet
    3. velj

    Just discovered a new 0-day RCE in a well known network monitoring software, the code is well written which took me sometime to find the vulnerability. you can exploit it without authentication under some conditions. stay tuned for the full exploit code and a detailed article!

    Poništi
  19. proslijedio/la je Tweet
    2. velj

    DVNA - Damn Vulnerable NodeJS Application

    Poništi
  20. proslijedio/la je Tweet
    3. velj

    Takeover story of repo 1.A site having github logo 2. Example: Click on logo it'll show you git repo() 3. In my case , It was 404 Main part 4. Created git account with name of company , So it was like Successful takeover

    Poništi
  21. 1. velj
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·