g33t

@g_3_3_t

| OSCP | penetration tester |

#
Vrijeme pridruživanja: listopad 2016.

Tweetovi

Blokirali ste korisnika/cu @g_3_3_t

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @g_3_3_t

  1. proslijedio/la je Tweet
    30. sij

    Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  2. proslijedio/la je Tweet

    Setup is well underway for Miami. Can’t wait to get started. The drawing for order will be at 8:30 tomorrow morning.

    Poništi
  3. proslijedio/la je Tweet
    14. sij

    How to exploiting a SSRF in WeasyPrint? The Bug That Exposed Your Password and 12 tricks for Repeater! All of this and more is available in the latest edition of our ! 👇👇👇

    Poništi
  4. proslijedio/la je Tweet
    14. sij

    I'm excited to share my post about discovering & exploiting multiple critical vulnerabilities in Cisco's DCNM. Busting Cisco's Beans :: Hardcoding Your Way to Hell PoC exploit code:

    Poništi
  5. proslijedio/la je Tweet
    11. sij

    We've added detection for the Citrix vulnerability (CVE-2019-19781). If you've configured Shodan Monitor () then you will automatically get notified if any of your devices are impacted.

    Poništi
  6. proslijedio/la je Tweet
    7. sij
    Poništi
  7. proslijedio/la je Tweet
    6. sij
    Poništi
  8. proslijedio/la je Tweet
    6. sij

    It's a pleasure moment when you got featured in list of "5 cybersecurity startups to look out for in 2020" Thanks for enlisting us

    Poništi
  9. proslijedio/la je Tweet
    16. stu 2019.

    iCloud bypassed successfully with iCloudBypassCA tool (dev - / ).

    Poništi
  10. proslijedio/la je Tweet
    10. stu 2019.

    Encryption-locked book from the French court, 16th century.

    Poništi
  11. proslijedio/la je Tweet
    26. lis 2019.
    Poništi
  12. proslijedio/la je Tweet
    23. lis 2019.

    TIL: How to exploit directory traversal in file upload with using curl -F "file=.jsp;filename=../../../../../../../../hacker.jsp"

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    16. lis 2019.
    Poništi
  14. proslijedio/la je Tweet
    16. lis 2019.

    AtomicBird, a quick crude POC to chain together some things => EasyHook for .NET payloads, Costura to pack modules (managed/unmanaged), Donut for shellcode generation and UrbanBishop for injection ❤️⚔️. More details on Github =>

    Poništi
  15. proslijedio/la je Tweet
    15. lis 2019.

    In 2015, we launched a SQLi lab in partnership with . While we no longer host the lab, the content is now freely available here: Enjoy!😀

    Poništi
  16. proslijedio/la je Tweet
    12. lis 2019.

    Fsmon - Monitor Filesystem On iOS / OS X / Android / FirefoxOS / Linux

    Poništi
  17. proslijedio/la je Tweet
    10. lis 2019.

    Security Descriptor Auditing Methodology: Investigating Event Log Security In this post, I establish my process for identifying access rights, determining default security, consideration of abuse implications, audit automation, and SACL research. Enjoy!

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    7. lis 2019.
    Poništi
  19. proslijedio/la je Tweet
    8. lis 2019.
    Poništi
  20. proslijedio/la je Tweet
    7. lis 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·