Tweetovi

Blokirali ste korisnika/cu @cyberg0100

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cyberg0100

  1. proslijedio/la je Tweet
    2. velj
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    A point I often drive home with customers, PUA's can pose a huge risk. Pro tip: if you have an EDR solution run a investigation for "keygen.exe" you may be surprised...

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    Cyber crime & criminals in movies and TV shows are often portrayed differently than their true identity. To learn what Hollywood often gets wrong about cyber criminals, visit the link. - -

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    SQL Injection Payload List by Password Cracking Is Easy: Here’s How to Do It by in API Security Testing(Part 1) by Saumya Prakash Rana

    Poništi
  6. proslijedio/la je Tweet
    3. velj
    Poništi
  7. proslijedio/la je Tweet
    3. velj

    A source code analyzer built for surfacing features Burp Bounty(a quick and simple way, to improve the active and passive scanner) Sublert is a security and reconnaissance tool ,

    Poništi
  8. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  9. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  10. proslijedio/la je Tweet
    2. velj

    A curated list of resources for learning about deploying, managing and hunting with Microsoft Sysmon. Contains presentations, deployment methods, configuration file examples, blogs and additional github repositories.

    Poništi
  11. proslijedio/la je Tweet
    1. velj
    Poništi
  12. Poništi
  13. proslijedio/la je Tweet
    2. velj
    Poništi
  14. proslijedio/la je Tweet
    2. velj
    Poništi
  15. proslijedio/la je Tweet
    2. velj
    Poništi
  16. proslijedio/la je Tweet
    2. velj

    UserEnum. Domain user enumeration tool

    Poništi
  17. proslijedio/la je Tweet
    1. velj
    Poništi
  18. proslijedio/la je Tweet
    31. sij

    Uncovering ‘msv’ and collecting credentials through PyKD

    Poništi
  19. proslijedio/la je Tweet
    31. sij

    Demystifying the Windows Firewall – Learn how to irritate attackers without crippling your network - thanks for sharing

    Poništi
  20. Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·