Olivier Chatail

@chatailo

IT sec pal interested in penetration testing, incident response and malware trends

Vrijeme pridruživanja: siječanj 2017.

Tweetovi

Blokirali ste korisnika/cu @chatailo

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @chatailo

  1. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  2. proslijedio/la je Tweet
    16. sij

    French infosec addict looking for a vulnerability researcher/pentester remote position. RT appreciated ! DMs open ;)

    Poništi
  3. proslijedio/la je Tweet
    22. pro 2019.

    Friends, VXUG is scouting additional content. We're looking for papers related to: -Malware Dev -Malware RE -OS Internals -Rootkits/Bootkits -Antivirus related papers If you have a paper you'd like to submit to us please DM me. Retweets appreciated to increase exposure.

    Poništi
  4. proslijedio/la je Tweet
    9. kol 2019.

    PINJECTRA: Known Windows 10 64-bit Process Injection Techniques + New One (dubbed "Stack Bomber") as a C++ Library

    Poništi
  5. proslijedio/la je Tweet
    9. kol 2019.
    Poništi
  6. proslijedio/la je Tweet
    7. kol 2019.

    How to Kill Symbolic Deobfuscation for Free

    Poništi
  7. 22. svi 2019.
    Poništi
  8. proslijedio/la je Tweet
    27. ožu 2019.

    Le challenge sera accessible vendredi 29 mars à partir de 14h à l'adresse suivante:

    Poništi
  9. proslijedio/la je Tweet
    1. velj 2019.

    ., the webcam covers you're giving out have an interesting defect: the purple ones are transparent. 🤔

    An image of a person's silhouette and the room behind them visible through what looks like a purple filter.
    A plastic purple webcam cover branded with the NSA's logo
    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    12. lis 2018.
    Poništi
  11. proslijedio/la je Tweet
    11. ruj 2018.

    We’re Seeing a Resurgence of the Demonic Astaroth WMIC Trojan

    Poništi
  12. 8. ruj 2018.
    Poništi
  13. 8. ruj 2018.

    “Open Source Intelligence Gathering 201 (Covering 12 additional techniques)” by

    Poništi
  14. proslijedio/la je Tweet
    15. kol 2018.
    Poništi
  15. proslijedio/la je Tweet
    9. kol 2018.

    GOD MODE UNLOCKED: hardware backdoors in some x86 CPUs White paper coming tomorrow.

    Poništi
  16. proslijedio/la je Tweet
    25. srp 2018.

    Robber : An open source tool for finding executables prone to DLL hijacking :

    Poništi
  17. proslijedio/la je Tweet
    23. srp 2018.

    Exposed: 157 GB of sensitive data from Tesla, GM, Toyota & others

    Poništi
  18. proslijedio/la je Tweet
    11. srp 2018.

    TIL : il existe une cartographie en Open Data et crowdsourcée des noeuds d'infrastructure critiques (énergie, communications, ...) Qu'est-ce qui pourrait mal se passer ?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·