Tweetovi

Blokirali ste korisnika/cu @dx_ranger

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @dx_ranger

  1. Prikvačeni tweet
    11. sij

    Custom C# Stager that works with Cobalt Strike staged Payloads:

    Poništi
  2. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    12. kol 2019.

    releasing the materials (source, slides & lab guide) for the workshop by and I: Writing custom backdoor payloads with c#. Hope you can learn and have fun as much as we did.

    Poništi
  4. proslijedio/la je Tweet
    10. pro 2019.

    Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    15. stu 2019.

    Red Team Operations video series with Cobalt Strike 4.0 looks *amazing*.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    1. kol 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·