Tweetovi

Blokirali ste korisnika/cu @art_2_la_guerre

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @art_2_la_guerre

  1. proslijedio/la je Tweet

    WinPwnage. Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques

    Poništi
  2. prije 9 sati
    Poništi
  3. proslijedio/la je Tweet
    4. velj

    A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    My Hacking Channel is now LIVE! Check out my first video (the USB-C one) and get ready for much more! I will be putting my streaming archives here from now on. :)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    4. velj
    Poništi
  6. 3. velj
    Poništi
  7. proslijedio/la je Tweet

    If you're on a Lan or an ISP where you can connect to other customers IP addresses, it never hurts to run this in an administrator prompt: c:\> netsh advfirewall firewall add rule name="Block-inbound" dir=in action=block Blocks ALL inbound traffic to your box.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    27. sij

    👋 operators: Which defensive settings have you encountered that made it *super* painful for you to operate in a Windows AD environment?

    Poništi
  9. 30. sij
    Poništi
  10. proslijedio/la je Tweet
    28. sij

    We've all received emails with no attachment and assume it's "safe" to open in a mail client (as long as we don't explicitly click on any URLs). Right? Not so much...

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    28. sij

    1. Windows Defender 2. EDR 3. Automated defanging of documents 4. Disabling macros, OLE, DDE, etc. 5. Disabling Windows Script Hosting 6. Private VLANs 7. Application whitelisting 8. Users not being local admins 9. 2FA on everything 10. Up-to-date patching

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    29. sij

    Run PowerShell command without invoking powershell.exe - just another great tool by

    Poništi
  13. 28. sij
    Poništi
  14. proslijedio/la je Tweet
    28. sij
    Poništi
  15. proslijedio/la je Tweet
    27. sij

    Given a Pcap File, plot a network diagram displaying hosts in the network, network traffic, highlight important traffic

    Poništi
  16. proslijedio/la je Tweet
    27. sij
    Poništi
  17. proslijedio/la je Tweet
    11. sij
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    25. sij
    Poništi
  19. proslijedio/la je Tweet
    26. sij

    Online hash checker for Virustotal and other services

    Poništi
  20. proslijedio/la je Tweet
    24. sij

    Starting to put together a Linux Privesc Video. Can anyone spot something non-network that I'm missing? - Recon (linPEAS/LinEnum) - Sudo - Permission Overview (file writes - sshKey/cron) - SetUID - Kernel - Cron - Network [mysql, postgres, erlang cookie (couchDb)]

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·