Tweetovi

Blokirali ste korisnika/cu @BorjaMerino

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @BorjaMerino

  1. Prikvačeni tweet
    1. stu 2019.

    Retro shellcoding for current threats: rebinding sockets in Windows

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Load encrypted PE from XML Attribute. MSBuild is still the best.😅 MSBuild sets Property then calls Execute. Use this example to decouple payloads & prove that all security products have a "Single File Bias". Decouple payloads to subvert detection.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  4. proslijedio/la je Tweet
    24. sij

    modexp is one of my fav. researchers; while I often skim on details he is killing it with posts that combine an extensive and comprehensive research on interesting and often nuanced topics and a very well written narrative top quality right there

    Poništi
  5. proslijedio/la je Tweet
    22. sij

    ppldump : Injects MiniDumpWriteDump() Shellcode into PPL procs (lsass demo) to dump memory. Got better tools, so useless to me now. Note sometimes the threads lock after the APC is queued, causing MiniDumpWriteDump to fail. Just resume the thread(s)

    Poništi
  6. proslijedio/la je Tweet
    17. sij

    My blog post about CVE-2020-0601 is online! I hope you guys enjoy it, I didn't sleep for 2 days now, pardon me if I made some mistakes :) Feel free to point out any mistakes!

    Prikaži ovu nit
    Poništi
  7. 18. sij

    Windows kernel explorer: A free powerful Windows kernel research tool

    Poništi
  8. proslijedio/la je Tweet
    15. sij
    Poništi
  9. proslijedio/la je Tweet
    14. sij

    No fancy EDR required to capture CVE-2020-0601 attempts (after patching). Just ensure you're forwarding Application log events. Currently, CVE-2020-0601 is the only Microsoft code (AFAIK) that calls the CveEventWrite API so event noise is not a concern.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    12. sij

    C++ for Hackers: How C++ can be a vital tool for infosec developers

    Poništi
  11. 11. sij

    Windows Process Injection in 2019 . Nice compilation with functional examples.

    Poništi
  12. proslijedio/la je Tweet
    6. sij

    Dear users, if you're a fan of the tool and are keen to throw a few dollarydoos at it, please head over here: All proceeds received before the end of Jan (including the current balance of USD $271) will be donated to the Rural Fire Service here in Australia.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    5. sij

    I've developed a new technique for bypassing firewalls/NATs and producing full TCP/UDP session to targeted user. Anyone have RCE for a service that's typically only run behind NATs (eg desktop software like Sonos, Spotify, Dropbox, etc which bind to *) and want to merge projects?

    Poništi
  14. proslijedio/la je Tweet
    5. sij

    One-Way Shellcode for firewall evasion using Out Of Band data

    Poništi
  15. proslijedio/la je Tweet
    3. sij

    APT34 partial tools leak (repost as this got taken down very quickly)

    Poništi
  16. 1. sij

    Nice post of describing how to detect Module Stomping: <--

    Poništi
  17. proslijedio/la je Tweet
    30. pro 2019.

    I'm going to donate a bunch of funds I've received from live streams to this cause, I'll match it personally, and my company will be matching it dollar for dollar. If you can give, please consider it!

    Poništi
  18. proslijedio/la je Tweet
    30. pro 2019.
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    26. pro 2019.

    Link to the repo: The gap between source and binary fuzzing is now smaller :)

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    23. pro 2019.
    Poništi
  21. 26. pro 2019.

    Remote Code Execution in restricted Windows environments

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·