Marius 'f0wL' Genheimer

@f0wlsec

CS/IT-Sec Student | Reverse Engineering & Malware Analysis 🦠👹 | Member | Hardware Hacking 📟

Germany
Vrijeme pridruživanja: srpanj 2018.

Tweetovi

Blokirali ste korisnika/cu @f0wlsec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @f0wlsec

  1. Prikvačeni tweet
    2. velj

    Let's talk Email Providers used for contacts in 2019. Out of 662 Email addresses found the top three Providers were: , Cockli and More information will be available soon™ on

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Let's talk Email Providers used for contacts in 2019. Out of 662 Email addresses found the top three Providers were: , Cockli and More information will be available soon™ on

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    When you are unpacking malware and the payload gets surprised.

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    Genau mein Humor.

    Poništi
  5. proslijedio/la je Tweet
    30. sij
    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    30. sij

    New variant of ransomware Extension .lockbit, TOR ransomgate, extension/folder blacklist, service/process killlist UAC bypass: CMSTPLUA, ColorDataProxy, ICMCalibration

    Prikaži ovu nit
    Poništi
  7. 29. sij

    In today's episode of "Weird people who use AnyRun" we have someone creeping on the Nemty Ransomware devs 🧐

    Poništi
  8. proslijedio/la je Tweet
    28. sij

    When preparing for future ransomware, don’t forget to print your response plan beforehand as it will be encrypted as well when ransomware attacks

    Poništi
  9. 28. sij

    Multiple completed exploits in the last 4 hours from: 37.120.144.35 🇭🇺 94.177.123.109 🇷🇺 And three through Tor (Exit nodes): 85.93.218.204 (Visual Online) 185.220.101.1 (Zwiebelfreunde) 23.129.64.204 (Emerald Onion)

    Poništi
  10. 27. sij

    Funnily enough their ftp credentials were submitted in clear text. C2: 80.82.69[.]52

    Prikaži ovu nit
    Poništi
  11. 27. sij

    Looks like they messed up their UAC Bypass with Ouroboros v7 🤣 Shadow Copy Deletion failed due to missing privileges

    Prikaži ovu nit
    Poništi
  12. 27. sij
    Poništi
  13. proslijedio/la je Tweet
    27. sij
    Odgovor korisnicima i sljedećem broju korisnika:
    Poništi
  14. proslijedio/la je Tweet
    8. velj 2019.
    Poništi
  15. proslijedio/la je Tweet
    22. sij

    RUMINT: Ghidra debugger module is in alpha testing; should work out of the box with gdb 8.0.1; more configuration required for Windows

    Poništi
  16. proslijedio/la je Tweet
    Poništi
  17. 17. sij

    "Let's build ": a weird ransomware builder with a video tutorial 🧐 AnyRun:

    Poništi
  18. 17. sij

    Two successful exploitations from 🇷🇺 (193.187.174.104)

    Prikaži ovu nit
    Poništi
  19. 17. sij

    New Exploit Attempt from 🇺🇸 (71.6.202.253)

    Prikaži ovu nit
    Poništi
  20. 16. sij

    2/2 the Netherlands and Luxembourg via a VPN service. The devices used are a smartphone and a Desktop PC set to the Tehran/Iran Timezone.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·