Paolo Di Prodi

@fortiguardai

Hacker, Data Scientist, Machine Learning engineer, Multi Agent researcher. Working as Senior Data Scientist for FortiGuard Labs.

Vrijeme pridruživanja: travanj 2018.

Tweetovi

Blokirali ste korisnika/cu @fortiguardai

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @fortiguardai

  1. proslijedio/la je Tweet
    18. ruj 2019.

    Meet our Amazing third dozen of over eighty speakers at the more to come.... TIME 2-> get your tickets before they are gone.... Checkout Keynotes from and Its gonna be Amazing !

    , , i još njih 7
    Poništi
  2. 16. ruj 2019.
    Poništi
  3. proslijedio/la je Tweet
    31. kol 2018.

    LAteral Movement Encryption technique (a.k.a. The "LAME" technique) : cc

    Poništi
  4. proslijedio/la je Tweet
    28. srp 2018.

    Build Your Own Botnet :

    Poništi
  5. proslijedio/la je Tweet
    26. lip 2018.

    This blogpost by and @Koen_veen is one of the VERY first blogposts I've seen showing end-to-end training of a Convolutional Neural Network in a clean API. Very exciting read. It's a glimpse into the future of AI and privacy.

    Poništi
  6. proslijedio/la je Tweet
    26. lip 2018.
    Poništi
  7. 26. lip 2018.

    Simple code for homomorphic machine learning applied to published:

    Poništi
  8. 22. lip 2018.

    Published a simple tool to extract icons from pe files here: very good for research.

    Poništi
  9. 19. lip 2018.
    Poništi
  10. 10. lip 2018.

    I will be giving a talk at next week

    Poništi
  11. proslijedio/la je Tweet
    8. lip 2018.

    pypykatz : Mimikatz implementation in pure Python : cc ||

    Poništi
  12. proslijedio/la je Tweet
    8. lip 2018.

    Dr0p1t-Framework : A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks : cc

    Poništi
  13. proslijedio/la je Tweet
    28. svi 2018.

    Using the Linux Audit System to detect badness -

    Poništi
  14. proslijedio/la je Tweet
    26. svi 2018.

    Evt2Sigma v0.0.1 Generate Rules from Log Entries > create detection rules for your SIEM from eventlog entries > proof of concept code > can be extended by adding more regular expressions

    Prikaži ovu nit
    Poništi
  15. 22. svi 2018.

    Released a simple library to identify beaconing behaviour in network data, example for here

    Poništi
  16. proslijedio/la je Tweet
    17. svi 2018.

    Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones [PAPER]

    Poništi
  17. 25. tra 2018.
    Poništi
  18. 21. tra 2018.

    Published a tool for bulk scanning of malware via , you will find it useful.

    Poništi
  19. 12. tra 2018.
    Poništi
  20. 12. tra 2018.

    Very interesting summary for alternate data streams, I observed many cases of malware actually using some of the tools described.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·