Tweetovi

Blokirali ste korisnika/cu @drizbit

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @drizbit

  1. Prikvačeni tweet
    20. tra 2018.

    Have you ever hated browser ads so much that you recompiled the entire 80GB Chromium codebase to reverse engineer the API calls invoked to display the ad, just to send your research to the Chrome devs to tell them to patch dat shit? has: 🤣

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    1. velj

    New video! What's the CPU stack used for and how does it work? Check it out:

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    This month I learnt how to analyse the JavaScript of a React Native application while bounty hunting. I wanted to share what I found out with everyone else.

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce

    Prikaži ovu nit
    Poništi
  5. 28. sij
    Poništi
  6. proslijedio/la je Tweet
    24. sij
    Poništi
  7. proslijedio/la je Tweet
    Poništi
  8. proslijedio/la je Tweet
    24. sij

    Quickly identify users / groups / password policy of the domain with prettyloot after dumping domain info using ntlmrelayx ! The script reads all files from the loot directory and prints information like a classic enum4linux output 😊

    Poništi
  9. proslijedio/la je Tweet
    23. sij

    New article! Anti-virus Exploitation: Malwarebytes 4.0.4 - Protection Not Found - Hijacking Malwarebytes via COM IPC

    Poništi
  10. proslijedio/la je Tweet
    21. sij

    Interested in the details of CVE-2020-0601/Curveball? I released a video on Friday going into the technical details of the Microsoft CryptoAPI vulnerability!

    Poništi
  11. proslijedio/la je Tweet
    20. sij
    Poništi
  12. proslijedio/la je Tweet
    13. sij

    Just released PDBlaster - a tool we wrote to quickly create and analyze PDB path datasets from malware collections. Inspired by the awesome debug details blog series by ! Tool: Blog:

    Poništi
  13. proslijedio/la je Tweet
    13. sij

    Just published a new video: Backdooring an IoT camera by creating a malicious firmware upgrade!

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    13. sij

    When using as part of your arsenal, make sure to add --data-length=50 {or any number in 20~60, the TCP packet header size). Otherwise, Nmap will in many cases return False Positives (i.e. too many open ports, or ports that are not actually open).

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    13. sij

    Modern C2 Infrastructure with Terraform, DigitalOcean, Covenant and Cloudflare

    Poništi
  17. proslijedio/la je Tweet
    13. sij

    Released a little tool to perform lateral movement that hide the command you are executing by registering a protocol handler. The protocol handler is executed over WMI by simply running start customhandler:// ❤

    Poništi
  18. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    9. sij

    Dsync - IDAPython Plugin That Synchronizes Disassembler And Decompiler Views

    Poništi
  20. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  21. proslijedio/la je Tweet
    10. svi 2019.

    Just updated Resources for Beginner Bug Bounty Hunters on Github.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·