glid3s

@glid3s

Just another security researcher...

Your EIP register...
Vrijeme pridruživanja: rujan 2011.

Tweetovi

Blokirali ste korisnika/cu @glid3s

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @glid3s

  1. proslijedio/la je Tweet
    prije 11 sati
    Poništi
  2. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  3. 2. velj

    It’s like someone spilled some skittles in my terminal. 🌈

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    SettingSyncHost.exe as a LolBin cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo

    Poništi
  5. proslijedio/la je Tweet
    31. sij

    I'm glad someone finally took a chance on me and got me a job. After 5 years of getting nowhere in this industry (guess people didnt think my work had value for their company). Now I can finally learn new things and step up my game.

    Poništi
  6. proslijedio/la je Tweet
    27. sij
    Poništi
  7. proslijedio/la je Tweet
    23. sij

    PoC (Denial-of-Service) for CVE-2020-0609 & CVE-2020-0610 Please use for research and educational purpose only.

    Poništi
  8. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    27. sij

    Just pushed a somewhat big update to SILENTTRINITY with a lot of forward compatibility fixes for Python 3.8 and made the PowerShell "stageless" stager public. Plus more modules and bug fixes

    Poništi
  10. proslijedio/la je Tweet
    14. sij

    Steps for making a self-signed ECDSA certificate using a fake Microsoft Certificate Authority. This isn't the CVE-2020-0601 bug (somehow you sign using ECDSA and make a valid chain with other CA), but useful commands if you are experimenting with this for Authenticode bypassing.

    Poništi
  11. 5. ruj 2011.

    Hello Twitter.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·