galadrim

@g4l4drim

oldschool freestyle stunt hacker. Black cat team leader. RT != endorsement, make your own mind

window.name
Vrijeme pridruživanja: prosinac 2009.

Tweetovi

Blokirali ste korisnika/cu @g4l4drim

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @g4l4drim

  1. proslijedio/la je Tweet
    31. sij

    “Try the ‘Black LED Acrylic’ at TAP Plastics,” they told me. “It’s the bee’s knees,” they told me. Can confirm, it is the bee’s knees. Testing here on Spectro’s LED matrix. No glare, solid blacks even in reasonably-lit room. 🐝🦵

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    ICYMI developed an online tool to convert Sigma rules into the query language of your choice FAQs What if my field values differ from the standard? What if I get too many false positives?

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    SettingSyncHost.exe as a LolBin cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  5. proslijedio/la je Tweet
    30. sij

    [THREAD] Je vous ai déjà parlé de la Cité Emmurée de Kowloon, le ghetto dystopique cyberpunk Hong-Kongais impénétrable des années 80 ?

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    2. velj

    Hackers are using AI & facial recognition on Tinder — Mashable Originals via

    Poništi
  7. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  8. proslijedio/la je Tweet
    2. velj

    Just completed Blue Badge. Such excellent content and well thought out challenges. I highly recommend it to anyone in infosec, even if you’ve been doing it for years. 100% you’ll learn new things to a value greater than the tiny course cost.

    Poništi
  9. proslijedio/la je Tweet
    1. velj

    Attention CTF players (and organizers, CTFd v2.0.0 - v2.2.2 has a serious vulnerability (CVE-2020-7245) in which an attacker could perform account takeover using a leading-trailing on the Registration form. It has been fixed in v2.2.3. Make sure to update!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    1. velj

    I just got a fancy idea to create strings in without using dangerous characters 😃 Inspired by challenge from .

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    1. velj

    For anyone wondering, yes it’s written in C# and yes I will be totally adding it as a SILENTTRINITY module if I can get the source code (a few changes need to be made in order for it to run in memory).

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    25. sij

    Some notes on PoshC2, operational considerations + a couple of tweaks to default beacons which might reduce exposure to Blue team

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    Qui émet beaucoup de CO2 sur terre ? (vision "par habitant" pour éviter les biais liés aux tailles différentes de pays) Source: World Bank (Global Carbon Project)

    Poništi
  14. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  15. proslijedio/la je Tweet
    2. velj
    Odgovor korisniku/ci

    + des entreprises de cybersécurité vues comme françaises en 🇫🇷 sont canadiennes, qataries, anglaises, etc (je ne sais pas si elles payent mieux) + les experts français partis à l’étranger (pour les ex- 1) 🇦🇺 2) 🇨🇦 3) 🇺🇸 ) et le retour est toujours que niveau de vie supérieur

    Poništi
  16. proslijedio/la je Tweet
    30. sij

    Intéressons nous à ces entreprises étrangères qui recrutent tous nos talents: - le salaire est plus élevé - elles permettent souvent du full remote - elles n’exigent pas que tous les travaux qu’ils réalisent soient liés à une ligne budgétaire ou un chiffre d’affaire

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    1. velj

    The biggest struggle I see from people transitioning from highly technical individual contributor roles to management roles is balancing their desire to remain technical while investing in things that are imperative to being a well rounded leader. That struggle is very real.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    27. sij

    I had to get a background check for my job, and it turns out the report is a 300+ page pdf of every single tweet I’ve ever liked with the work “fuck” in it. Enjoy your dystopian bs! *waves*

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    1. velj

    My Linux Memory Grabber tool now prefers to use AVML for memory capture (falling back to LiME if AVML fails)

    Poništi
  20. proslijedio/la je Tweet
    31. sij

    Jesus, no! Please don't run around screwing up all those ongoing police investigations by doxxing criminals who feel a little too safe. Just give everything you have to law enforcement.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·