Tweetovi

Blokirali ste korisnika/cu @duzvik

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @duzvik

  1. proslijedio/la je Tweet
    3. velj

    VB6 Packers are no joke, This one took me a while to write and I do hope you enjoy it! Analyzing Modern Malware Techniques - Part 3 Vb6 packers

    Poništi
  2. proslijedio/la je Tweet
    prije 7 sati

    2020-02-05: [Breaking]🔥🆕 "🇷🇺Pro-Russian CyberSpy Intensifies Ukrainian 🇺🇦 Security Targeting" 🔦The 'Fifth Domain': Gamaredon Wages Silent War with Ukranian Military & Law Enforcement ➡️5k Victim Scope in Ukraine Along 'Separation Line'

    Prikaži ovu nit
    Poništi
  3. prije 11 sati
    Poništi
  4. proslijedio/la je Tweet
    4. velj

    x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 Often AVs rely on simple signatures to detect malicious software and I needed a tool in order to confirm this behavior and be able to produce a working bypass. That’s why I wrote x0rro.

    Poništi
  5. 31. sij
    Poništi
  6. 31. sij
    Poništi
  7. 29. sij

    A repository of Yara rules created automatically as translations of machine learning models.

    Poništi
  8. 29. sij

    Adversaries use tracking pixels in spear-phishing to track if the email was opened. Summary info in a thread by

    Poništi
  9. 29. sij
    Poništi
  10. 27. sij

    🔥Executing .csproj from a remote location (UNC path) using MSBuildAPICaller

    Poništi
  11. 27. sij
    Poništi
  12. proslijedio/la je Tweet
    23. sij

    This is a cool trick. This works because a custom service trigger is defined. Action: 1 (SC_ACTION_RESTART) Guid: Microsoft-Windows-Feedback-Service-TriggerProvider ETW Provider Type: 0x14 (SERVICE_TRIGGER_TYPE_CUSTOM)

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    23. sij

    behavior detection won the race :)

    Poništi
  14. 21. sij

    Red Team: Use Case of Open Source Weaponization

    Poništi
  15. 15. sij
    Poništi
  16. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  17. 13. sij
    Poništi
  18. proslijedio/la je Tweet

    Uploaded my CVE-2019-19781 (Citrix ADC) Honeypot. It's capable of detecting and logging both scan and exploitation attempts.

    Poništi
  19. 11. sij

    Nice pull request ;)

    Poništi
  20. 10. sij

    Managing Active Directory groups from Linux

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·