Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
Turning a hotel key card into a stolen credit card : https://www.youtube.com/watch?v=ZDstCHYlj0U … cc
@modernrogueshow -
-
Hardware Debugging for Reverse Engineers (Part 1) : SWD, OpenOCD and Xbox One Controllers : https://wrongbaud.github.io/stm-xbox-jtag/ cc
@wrongbaudpic.twitter.com/mrMwe3U2xW
-
Bypass SameSite Cookies Default to Lax and get CSRF : https://medium.com/@renwa/bypass-samesite-cookies-default-to-lax-and-get-csrf-343ba09b9f2b … cc
@RenwaX23pic.twitter.com/PKtlZPLhGh -
OK Google - Bypass the authentication! (How a chain of vulnerabilities lead to special world working as a passpartout for a Google Assistant application) : https://techblog.mediaservice.net/2020/01/ok-google-bypass-the-authentication/ … cc
@s0wdustpic.twitter.com/wDKlZ1ClWu
-
Regex cheatsheet for the haters : https://github.com/geongeorge/i-hate-regex … cc
@geongeorgekpic.twitter.com/YO6GwTEHk2
-
Critical Flaw in Trezor Hardware Wallets (attack relies on voltage glitching to extract an encrypted seed ,crack the encrypted seed which is protected by a 1-9 digit PIN) : https://blog.kraken.com/post/3662/kraken-identifies-critical-flaw-in-trezor-hardware-wallets/ … http://wallet.fail : https://www.youtube.com/watch?v=Y1OBIGslgGM … Demo:https://youtu.be/6pKuHYwrGkU
-
PlaystoreDownloader : A command line tool to download Android applications directly from the Google Play Store : https://github.com/ClaudiuGeorgiu/PlaystoreDownloader … (not affiliated with Google in any way)pic.twitter.com/h2WfXYe3bH
-
Obfuscapk : A black-box obfuscation tool for Android apps : https://github.com/ClaudiuGeorgiu/Obfuscapk …pic.twitter.com/1dDLMU0uyX
-
Local root exploit via the QEMU graphics driver : https://www.youtube.com/watch?v=DhVZ7vO69DI … cc
@awesomekling SerenityOS : Graphical Unix-like operating system for x86 computers : https://github.com/SerenityOS/serenity …pic.twitter.com/rOA21ibVKT
-
Attacking Azure, Azure AD, and Introducing PowerZure : https://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a … cc
@Haus3c PowerZure : PowerShell script to interact with Azure : https://github.com/hausec/PowerZure … Azure AD Connect for Red Teamers : https://blog.xpnsec.com/azuread-connect-for-redteam/ …pic.twitter.com/fOMpnw4gD7
-
Tracking REvil : https://www.kpn.com/security-blogs/Tracking-REvil.htm … ( 150k unique infections, extracted ransom demands from 148 samples together demanding more than 38 million dollars)pic.twitter.com/pKFoTIXMrB
-
iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU : https://github.com/HE-Wenjian/iGPU-Leak … Slides : https://github.com/HE-Wenjian/iGPU-Leak/blob/master/iGPU-Leak_Slides.pdf … Demo video of Shared Local Memory (SLM) leakage :https://www.youtube.com/watch?v=xHihb2SwXyo …
-
SpiderFoot : the most complete OSINT collection and reconnaissance tool : https://github.com/smicallef/spiderfoot … cc
@spiderfoot More : https://www.spiderfoot.net/spiderfoot-3-0-open-source-release/ …pic.twitter.com/7rFnCNnH8w
-
x86-manpages : x86 and amd64 instruction reference manual pages : https://github.com/ttmo-O/x86-manpages … cc
@__TTMO__ x86 and amd64 instruction reference : https://www.felixcloutier.com/x86/index.html (Last updated 2019-05-30)pic.twitter.com/vG6osDHTcK
-
MSBuild without MSBuild.exe : https://pentestlaboratories.com/2020/01/27/msbuild-without-msbuild/ … Demo : https://youtu.be/HfpmqgwvGx4 pic.twitter.com/26ZTDWGaRH
-
Unfurl : It takes a URL and expands ("unfurls") it into a directed graph, extracting every bit of information from the URL and exposing the obscured : https://dfir.blog/introducing-unfurl/ … cc
@_RyanBensonpic.twitter.com/tW9ZikSz8g -
memhunter : Live hunting of code injection techniques : https://github.com/marcosd4h/memhunter … cc
@marcosd4hpic.twitter.com/wkuRUx3JuQ
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
