b4rtik

@b4rtik

Sometimes Pentester, sometimes Sysadmin. Developer of bad things. eCPPT 🇮🇹

Vrijeme pridruživanja: studeni 2011.

Tweetovi

Blokirali ste korisnika/cu @b4rtik

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @b4rtik

  1. Prikvačeni tweet
    10. stu 2019.

    Pushed a massive update to Red Peanut with DonutS integration, Amsi evasion, dynamic functions invoke, direct syscall and blockdlls command

    Poništi
  2. 3. velj

    campaign target customers fake doamin: htxps://my-timtelecom.com

    Poništi
  3. 31. sij
    Poništi
  4. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  5. 22. sij
    Poništi
  6. proslijedio/la je Tweet
    20. sij

    As promised, a short post on Hyper-V admin privesc: /cc

    Poništi
  7. proslijedio/la je Tweet
    20. sij

    It's here!!! Tell your colleagues, tell your friends, tell your grandma.

    Prikaži ovu nit
    Poništi
  8. 20. sij
    Poništi
  9. proslijedio/la je Tweet
    19. sij

    command-line MSBuild.exe detection's got your down? How about MSBuild without MSBuild.exe?

    Poništi
  10. 18. sij
    Poništi
  11. proslijedio/la je Tweet
    18. sij
    Odgovor korisnicima

    Why are there still big endpoint detection vendors not looking at these examples/techniques like we do... If this doesn’t change then OST developers will always stay ahead of the game. Instead of complaining, the industry should take the OST community as an example and catch up.

    Poništi
  12. proslijedio/la je Tweet
    16. sij

    I made a few additions to the PowerUpSQL wiki cheat sheet regarding authentication options for others who might need it:

    Poništi
  13. 14. sij
    Poništi
  14. proslijedio/la je Tweet
    9. sij

    are the bane of existence huh? Stopping open source tools won't stop attackers. Wake up people.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    9. sij

    Spray-AD, a new Kerberos password spraying tool for Cobalt Strike that might come in handy when assessing Active Directory environments for weak passwords (generates event IDs 4771 instead of 4625).

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    4. sij

    Mapping Injection - Just another Windows Process Injection

    Poništi
  17. proslijedio/la je Tweet
    1. sij

    New version of minidump is out. Some minor improvements added, and now it comes with a command-line shell for browsing around the dump file. Available on github and pip

    Poništi
  18. 30. pro 2019.

    Still some valuable content from the MDSec crew.

    Poništi
  19. proslijedio/la je Tweet
    28. pro 2019.

    Infosec is going way too legit. Where there used to be artistic chaos, we now have endless discussions about disclosure and “influencers” touring the circuit. Haven’t been this disappointed since the ending of The Twilight Saga. 2020 soon hackers, raise hell! 😈

    Poništi
  20. proslijedio/la je Tweet
    27. pro 2019.

    SharpSploit v1.5 is out! Includes amazing work from , , , , and . Includes: lateral movement over SCM and PSRemoting, an AMSI bypass, CreateProcessWithToken, and DynamicInvoke improvements. 🔥🔥🔥

    Poništi
  21. proslijedio/la je Tweet
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·