Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @g_3_3_t
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @g_3_3_t
-
g33t proslijedio/la je Tweet
Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools https://morph3sec.com/2019/07/16/Windows-Red-Team-Cheat-Sheet/ …pic.twitter.com/oDXKA2bN4b
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
Setup is well underway for
#Pwn2Own Miami. Can’t wait to get started. The drawing for order will be at 8:30 tomorrow morning.#P2OMiamipic.twitter.com/dLGglP0Olr
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
How to exploiting a SSRF in WeasyPrint? The Bug That Exposed Your
@PayPal Password and 12 tricks for@Burp_Suite Repeater! All of this and more is available in the latest edition of our#BugBytes!#bugbounty

https://go.intigriti.com/bugbytes-53 Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell https://srcincite.io/blog/2020/01/14/busting-ciscos-beans-hardcoding-your-way-to-hell.html … PoC exploit code: https://srcincite.io/pocs/cve-2019-15975.py.txt … https://srcincite.io/pocs/cve-2019-15976.py.txt … https://srcincite.io/pocs/cve-2019-15977.py.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
We've added detection for the Citrix vulnerability (CVE-2019-19781). If you've configured Shodan Monitor (https://monitor.shodan.io ) then you will automatically get notified if any of your devices are impacted.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
Blind SQL Injection without an “in”https://medium.com/@terjanq/blind-sql-injection-without-an-in-efa689b0ac0b …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
g33t proslijedio/la je Tweet
It's a pleasure moment when you got featured in list of "5 cybersecurity startups to look out for in 2020" Thanks for enlisting us
@BWBusinessworld#startup#BusinessGrowthhttp://bwdisrupt.businessworld.in/article/5-cybersecurity-startups-to-look-out-for-in-2020/02-01-2020-181400/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
iCloud bypassed successfully with iCloudBypassCA tool (dev -
@aJBboCydia/@CrazyMind90).#icloudbypass#toolpic.twitter.com/V7Z2r5cZelHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
Encryption-locked book from the French court, 16th century.pic.twitter.com/bT3z25SKMc
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
#HappyDiwali to all. Let's celebrate#peaceful,#happy and#GreenDiwali#saveenvironment#GoGreen#Diwali2019pic.twitter.com/Kr3XB37XSl
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
TIL: How to exploit directory traversal in file upload with
#curl using curl -F "file=@PentesterLab.jsp;filename=../../../../../../../../hacker.jsp"pic.twitter.com/Y8jmbWEkpb
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
Build your own 2G 3G 4G 5G BTS with SDR
#SDR#USRP#BladeRF#osmocom https://cn0xroot.com/2019/10/17/build_2g_3g_4g_5g_with_sdr/ …pic.twitter.com/UoFFLMAsHc
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
AtomicBird, a quick crude POC to chain together some things => EasyHook for .NET payloads, Costura to pack modules (managed/unmanaged), Donut for shellcode generation and UrbanBishop for injection

. More details on Github => https://github.com/FuzzySecurity/Sharp-Suite#atomicbird …pic.twitter.com/VU8mfvuHhe
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
In 2015, we launched a SQLi lab in partnership with
@SecurityTube. While we no longer host the lab, the content is now freely available here: https://www.notsosecure.com/sql-injection-lab/ … Enjoy!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
Fsmon - Monitor Filesystem On iOS / OS X / Android / FirefoxOS / Linuxhttp://www.kitploit.com/2019/10/fsmon-monitor-filesystem-on-ios-os-x.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
Security Descriptor Auditing Methodology: Investigating Event Log Security https://posts.specterops.io/security-descriptor-auditing-methodology-investigating-event-log-security-d64f4289965d … In this post, I establish my process for identifying access rights, determining default security, consideration of abuse implications, audit automation, and SACL research. Enjoy!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
Azure AD and Common WS-Trust MFA Bypass explainedhttps://securecloud.blog/2019/10/08/advisories-1-2-azure-ad-and-common-ws-trust-mfa-bypass-explained/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
Modern Red Team Infrastructure https://silentbreaksecurity.com/modern-red-team-infrastructure/ …
#redteam#Pentest#PentestingHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
g33t proslijedio/la je Tweet
Bypassing the Microsoft-Windows-Threat-Intelligence Kernel APC Injection Sensorhttps://medium.com/@philiptsukerman/bypassing-the-microsoft-windows-threat-intelligence-kernel-apc-injection-sensor-92266433e0b0 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.