Frank;-- '

@fr4nz0R

echo SSBsb3ZlIHRoaXMgc3R1ZmYgbW9yZSB0aGFuIGV2ZXJ5dGhpbmcuIFRyeWluZyB0byBkbyBteSBiZXN0 | base64 --decode

Vrijeme pridruživanja: prosinac 2016.

Tweetovi

Blokirali ste korisnika/cu @fr4nz0R

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @fr4nz0R

  1. proslijedio/la je Tweet
    1. velj

    Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  3. proslijedio/la je Tweet
    29. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    I finally got around to publishing my Sysmon deployment method. Hope people find it useful:

    Poništi
  4. 30. sij

    I was writing in Metro and I didnt found your Twitter account before: really nice work!

    Prikaži ovu nit
    Poništi
  5. 30. sij
    Prikaži ovu nit
    Poništi
  6. 30. sij

    Really nice tips for implementing Sysmon user:jokezone. The best part? Pseudocode: fast to implement, good for customize it for your purpose.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    27. sij
    Poništi
  9. proslijedio/la je Tweet
    26. sij

    Online hash checker for Virustotal and other services

    Poništi
  10. proslijedio/la je Tweet
    25. sij
    Poništi
  11. proslijedio/la je Tweet
    20. sij
    Poništi
  12. proslijedio/la je Tweet
    19. sij

    SCOOP: A hacker has leaked this week a list of Telnet passwords for more than 515,000 servers, routers, and IoT devices * List leaked by the operator of a DDoS-for-hire service * Operator moving from IoT botnets to rented cloud servers

    Poništi
  13. proslijedio/la je Tweet
    19. sij
    Poništi
  14. proslijedio/la je Tweet
    18. sij

    Here my GitHub with many scripts useful for red teamers - Enjoy!

    Poništi
  15. proslijedio/la je Tweet
    19. sij
    Poništi
  16. proslijedio/la je Tweet

    last use case for today Yes, it's also dangerous for Microsoft VBA macro (especially when you think "Disable all Macros except digitally signed" will protect you)

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    18. sij

    CVE-2020-2551 Weblogic Remote Code Execute RCE With IIOP

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    16. sij

    Updated PoC to include the root trusted CA "Microsoft ECC Product Root Certificate Authority 2018" Also included a signed and unsigned 7z.exe for you to test out. Please only use for research and education.

    Poništi
  19. proslijedio/la je Tweet
    16. sij

    Il di fa parte della nuova generazione di centri che aiutano le aziende a proteggere il proprio business e gli ecosistemi in cui operano, creando un alto livello di digitale, oggi fondamentale. Alberto Meneghini

    Poništi
  20. proslijedio/la je Tweet
    16. sij

    Sicurezza informatica, nasce a Napoli il Cyber Fusion Center di Accenture

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·