dabi0ne

@dabi0ne

Pentester / Py,PSH developer

Vrijeme pridruživanja: studeni 2012.

Tweetovi

Blokirali ste korisnika/cu @dabi0ne

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dabi0ne

  1. proslijedio/la je Tweet
    2. ruj 2019.
    Poništi
  2. proslijedio/la je Tweet
    7. srp 2019.

    [ ] : Un grand bravo à qui décroche le 13ème et dernier flag du en premier ! La est pour toi 👏🎩🙃 ! Congrats également à pour la 2ème place 😃😉 ! Le sac à dos Bobby est pour toi 👏 !

    Poništi
  3. proslijedio/la je Tweet
    7. srp 2019.

    Our team members and have finally finished the 🎩 at the 🥇 and 🥈 place! 🎉 Thanks for keeping them entertained that long 😉

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    14. tra 2019.

    Writeup for the 'Hallowed be thy name' challenge of the Key topics: crypto, bad seed, PRNG, xor, known-plaintext Author: ➡️ cc

    Poništi
  5. proslijedio/la je Tweet
    16. tra 2019.

    Writeups for the 'calc-1' and 'calc-2' challenges of the Key topics: jail, JavaScript, node.js, regexp, RCE Author: ➡️ ➡️ cc

    Poništi
  6. proslijedio/la je Tweet
    8. sij 2019.

    If you love and automation as much as we do, check out our latest module! cc

    Poništi
  7. proslijedio/la je Tweet
    22. svi 2018.

    PowerShdll. Run PowerShell with rundll32. Bypass software restrictions

    Poništi
  8. proslijedio/la je Tweet
    22. svi 2018.

    Whonow - A "Malicious" DNS Server For Executing DNS Rebinding Attacks On The Fly (Public Instance Running On ) (via )

    Poništi
  9. proslijedio/la je Tweet
    17. svi 2018.

    Pratique de développement non sécurisée sur Azure : exposition d’identifiants d’accès FTP

    Poništi
  10. proslijedio/la je Tweet
    21. sij 2018.

    🏆 Nous aurons la chance d'aller à 🇨🇭 pour représenter la France ! 🇫🇷 🏆 Super challenges : bravo et merci aux auteurs !

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    20. stu 2017.

    After a long gestation, the Top 10 2017 Final has been released. You can obtain it from here: . More details here: Thank you to the and community from @neilsmithine

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    11. stu 2017.
    Poništi
  13. proslijedio/la je Tweet
    9. stu 2017.

    Thanks for coming to my session at ! It is an awesome conf. My slides and sample code are available at

    Poništi
  14. proslijedio/la je Tweet
    23. lis 2017.

    I played around with some obfuscation techniques for DDE. Hopefully of interest to both red and blue:

    Poništi
  15. proslijedio/la je Tweet
    19. lis 2017.

    Disable DDEAUTO for Microsoft Word, Excel, Outlook, versions 2010, 2013, 2016 Appears to block known DDE attacks.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    13. lis 2017.
    Poništi
  17. proslijedio/la je Tweet
    11. lis 2017.

    Omg is there seriously no way of enumerating installed Windows hooks (SetWindowsHookEx) from userland =>

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    11. lis 2017.

    Awesome Hacking Resources : A collection of hacking / pentetration testing resources to make you better! :

    Poništi
  19. proslijedio/la je Tweet
    12. lis 2017.

    Deuxième jour des ! vous attend sur le stand 184 dans le forum 2.

    Poništi
  20. proslijedio/la je Tweet
    4. lis 2017.

    From crash to code execution on DiskBoss Enterprise v8.4.16:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·