Tweetovi

Blokirali ste korisnika/cu @Dr4s1l

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Dr4s1l

  1. proslijedio/la je Tweet
    prije 5 sati

    PolyShell: a Bash/Batch/PowerShell polyglot template for input injection

    Poništi
  2. proslijedio/la je Tweet

    Analyzing WhatsApp Calls with Wireshark, radare2 and Frida by Marvin Schirrmacher 📱🔥

    Poništi
  3. proslijedio/la je Tweet

    We are looking for talented mixed critical engineers, apply now!

    Poništi
  4. proslijedio/la je Tweet
    4. velj
    Poništi
  5. proslijedio/la je Tweet
    4. velj

    Nfstream - A Flexible Network Data Analysis Framework

    Poništi
  6. proslijedio/la je Tweet
    4. velj

    👻 Meet CursedNet, my tiny (38 KB) Neural Network capable of demodulating FM Stations in real-time. Available now on CyberRadio’s Fork:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    4. velj

    I modified that POC from the Teamviewer CVE to parse an exported .reg file

    Poništi
  8. proslijedio/la je Tweet
    4. velj

    Running Windows 10 pro arm64 in Qemu with kvm & visual studio code on my pbp with help from usual suspect - this is seriously the most epic little hacking computer. Next up, Windows Server 2019! 🥳 before you ask, performance is fast!

    Poništi
  9. proslijedio/la je Tweet
    4. velj
    Poništi
  10. proslijedio/la je Tweet
    Poništi
  11. proslijedio/la je Tweet
    4. velj
    Poništi
  12. proslijedio/la je Tweet
    4. velj
    Poništi
  13. proslijedio/la je Tweet
    4. velj

    Real time monitoring of secrets on github, gitlab and bitbucket 🍿

    Poništi
  14. proslijedio/la je Tweet
    4. velj

    How To Hack A Portable Bluetooth Speaker By Skipping The Bluetooth Portable Bluetooth speakers have joined the club of ubiquitous personal electronics. What was once an expensive luxury is now widely accessible thanks to a prolific landscape of manufact…

    Poništi
  15. proslijedio/la je Tweet
    3. velj

    A tool for automating cracking methodologies through Hashcat from

    Poništi
  16. proslijedio/la je Tweet
    3. velj
    Poništi
  17. proslijedio/la je Tweet
    3. velj

    [Actu] La publie un guide sous licence libre pour accompagner tous les acteurs du développement web ou applicatif dans la mise en conformité de leurs travaux. Le guide est composé de 16 fiches thématiques ouvertes à contribution. ✏ ▶

    Poništi
  18. proslijedio/la je Tweet
    3. velj

    WinPwnage - UAC bypass, Elevate, Persistence and Execution methods

    Poništi
  19. proslijedio/la je Tweet
    3. velj
    Poništi
  20. proslijedio/la je Tweet
    2. velj

    After adding 6,981 lines of code and removing 2,187 v2r0 has been released. There's a truckload of new features including BINARY support, Escrows and colorized diff-views to name but a few... Thanks for making this possible!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·