Tweetovi

Blokirali ste korisnika/cu @durchfall3n

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @durchfall3n

  1. proslijedio/la je Tweet
    31. sij
    Poništi
  2. proslijedio/la je Tweet
    29. pro 2019.

    Open source RAT collection, and malicious RAT analysis reports.

    Poništi
  3. 24. stu 2019.
    Poništi
  4. proslijedio/la je Tweet
    12. stu 2019.

    Shipping soon. We have a lot to ship this year so please be patient.

    Poništi
  5. proslijedio/la je Tweet
    29. ruj 2019.
    Poništi
  6. proslijedio/la je Tweet
    27. ruj 2019.
    Poništi
  7. proslijedio/la je Tweet
    10. ruj 2019.

    When you think LPE via process creation impersonation does not exists on Windows, think twice - . Kudos to for the inspiration.

    Poništi
  8. proslijedio/la je Tweet
    8. ruj 2019.

    A tool for UEFI firmware analysing with IDA

    Poništi
  9. proslijedio/la je Tweet
    6. ruj 2019.
    Poništi
  10. proslijedio/la je Tweet
    3. ruj 2019.

    I’ve decided to write up one of the iOS exploits in a new series, walking through each step of the underlying exploit development process. Hope these post will be more accessible for ppl trying to learn exploit dev and understand how exploit devs think.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    1. ruj 2019.

    Short blog post as a follow up to my two year old one on becoming TrustedInstaller using a poorly documented trick with the Task Scheduler.

    Poništi
  12. proslijedio/la je Tweet
    29. kol 2019.
    Poništi
  13. 27. kol 2019.

    Last flag was... really somewhat hidden in Pla1nSight . =)

    Poništi
  14. proslijedio/la je Tweet
    13. kol 2019.

    Interested in seeing the slides from my Arsenal presentation? The slide deck for WMImplant: An Offensive Use Case of WMI are available here - I’ll get the demo video uploaded shortly!

    Poništi
  15. proslijedio/la je Tweet
    12. kol 2019.

    (PDF Slides) My presentation at DEF CON 27 follow... .NET Malware Threat: Internals and Reversing:

    Poništi
  16. proslijedio/la je Tweet
    12. kol 2019.
    Poništi
  17. proslijedio/la je Tweet
    12. kol 2019.

    Just shared slides from my DEFCON talk. Check it out here:

    Poništi
  18. proslijedio/la je Tweet

    Here's a repository of all the code and tools I developed to explore this attack surface.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    12. kol 2019.

    releasing the materials (source, slides & lab guide) for the workshop by and I: Writing custom backdoor payloads with c#. Hope you can learn and have fun as much as we did.

    Poništi
  20. proslijedio/la je Tweet
    11. kol 2019.

    HERE WE GO! 's PPP wins their *5th* Capture the Flag in 7 years! 😮👏👏

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·