AnonimCoder

@anonimcoder

Malware Analysis, Security Research, Exploit Development.

Vrijeme pridruživanja: srpanj 2019.

Tweetovi

Blokirali ste korisnika/cu @anonimcoder

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @anonimcoder

  1. proslijedio/la je Tweet

    Bypassing Windows User Account Control from

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  3. proslijedio/la je Tweet
    prije 8 sati
    Poništi
  4. proslijedio/la je Tweet

    White-box-pentesting- This is created to demonstrate pass-the-hash, 2nd order and type juggling . A good to practice basic . :-

    Poništi
  5. proslijedio/la je Tweet

    hidden-tear- - It's a ransomware-like file sample which can be modified for specific purposes. :-

    Poništi
  6. proslijedio/la je Tweet
    prije 21 sat

    targets 🇮🇹 from XLS > VBA > DLL hxxps://romaitaliacommerciale.site/etis?<GUID> romaitaliacommerciale].site milanoofficialfatt.]online barifattonumero[.pw officebuysell].pro

    Poništi
  7. proslijedio/la je Tweet
    prije 9 sati
    Poništi
  8. proslijedio/la je Tweet
    prije 9 sati

    Custom Signed Kernel Driver's Pretty cool 😃 Without the need to enable TestSigning. Sample Project:

    Poništi
  9. proslijedio/la je Tweet
    prije 9 sati
    Poništi
  10. proslijedio/la je Tweet

    New version of the Security Suite (anti-tampering library written in Swift to protect your iOS app according to the OWASP MASVS standard) * New verbose&filterable amIJailbrokenWithFailedChecks() method * New anti-re indicator

    Poništi
  11. proslijedio/la je Tweet
    prije 9 sati

    Least Significant Bit (LSB) is a steganography method that malware devs often use to embed hidden malware inside of images. Learn how the "ScarCruft APT Malware Uses Image Steganography" -via

    Poništi
  12. proslijedio/la je Tweet

    🔥 CVE-2019-18426 for Web and Desktop contained multiple vulnerabilities, which, when combined together, could have even allowed remote attackers to read files from a victim's local file-system just by sending messages. Read details:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    prije 10 sati

    Multiple US states are working to ban companies from making employee microchipping mandatory. The owner of states his company received approx 100 orders for various amounts of chips from US businesses between 2015 & 2018.

    Poništi
  14. prije 10 sati
    Poništi
  15. proslijedio/la je Tweet
    prije 10 sati
    Poništi
  16. proslijedio/la je Tweet
    prije 11 sati

    If your network is vulnerable, a strong password is still the best defense against an attacker gaining access to your Wi-Fi network using this or another password cracking attack.

    Poništi
  17. proslijedio/la je Tweet

    Last year, researched and published a command-and-control module for SMB DOUBLEPULSAR. Since then, we've researched and reverse-engineered the RDP version of the implant. Today we're publishing that research and a module for it. Details:

    Poništi
  18. proslijedio/la je Tweet

    Monkeys in labs are subjected to painful, and irrelevant experiments They’re starved and restrained, they’re infected with diseases, objects are screw into their heads… Stop Supporting Animal Cruelty GoVegan🌱🌎

    Poništi
  19. proslijedio/la je Tweet

    EmoCheck - Malware detection tool for Windows OS

    Poništi
  20. proslijedio/la je Tweet
    prije 12 sati

    version:2.14 built:111 group:3581 [10291029JSJUYNHG] c2:xtxuiuo61,com VT:02b7506dbd4129c3febdec6bd35ea6c6 ref

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·