Tweetovi

Blokirali ste korisnika/cu @gmhzxy

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @gmhzxy

  1. proslijedio/la je Tweet
    7. sij

    PCILeech FPGA custom PCIe configspace now supported! Mimic real devices more closely for research purposes 😈 Also, code signing of binaries.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    29. pro 2019.
    Poništi
  3. proslijedio/la je Tweet

    How to prepare a dll to be loaded into LSASS with protection mode? -Get an EV Code signing cert (300$) -Open a MS partner account -add the "hardware" program -go to "file signing service" - prepare a cab containing the dll - sign the cab with your cert - submit and wait 1 hour

    Poništi
  4. proslijedio/la je Tweet
    16. pro 2019.

    Finally released! The ScreamerM2 is a a super awesome DMA attacker platform in a very convenient form factor. It's affordable, stable and supported by PCILeech! Happy DMA attacking 😈

    Poništi
  5. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  6. Poništi
  7. proslijedio/la je Tweet
    5. pro 2019.

    Password dumps Collections 1-5's (.txt only): 27.47 B Records (806GB) 296 GB of usernames 260 GB of domain names 250 GB of passwords Unique: 18 GB of usernames (1.296.186.909) 2.3 GB of domain names (67.031.505) 16 GB of passwords (958.883.636)

    Prikaži ovu nit
    Poništi
  8. Poništi
  9. proslijedio/la je Tweet
    27. stu 2019.

    Teardown: Windows 10 on ARM - x86 Emulation. In this article, we present five key features of x86 emulation, concluding with an example of the raw opcode translation procedure. Learn more:

    Poništi
  10. proslijedio/la je Tweet
    26. stu 2019.

    You can disable the Windows 10 security event log as a low privileged user due to weak registry permissions. Requires reboot to kick in, but the system will stop doing command line logging, etc, if configured. Change "Start"->0 or corrupt/delete other properties.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    19. stu 2019.
    Poništi
  12. proslijedio/la je Tweet
    18. stu 2019.

    The BabyKernel Windows exploitation challenge from last week's is up on GitHub:

    Poništi
  13. proslijedio/la je Tweet
    17. stu 2019.

    This got way less views than I thought it would. This is our first Linux game hacking tutorial, and it's pretty noice so I am shamelessly retweeting it. If you haven't seen it yet, please enjoy :)

    Poništi
  14. proslijedio/la je Tweet
    16. stu 2019.

    Is there anyone will be interested in these topic if there is a book🙂!?

    Poništi
  15. 12. stu 2019.
    Poništi
  16. proslijedio/la je Tweet
    7. stu 2019.
    Poništi
  17. 10. stu 2019.
    Poništi
  18. proslijedio/la je Tweet
    7. stu 2019.

    For the past 6 months, it has been possible to completely disable by simply ... emulating *two* different packets over the named pipe with (god forbid) static data:

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    6. stu 2019.

    I wrote the 2nd tutorial for my kernel exploit series: bypassing SMEP/KPTI via kernel ROP.

    Poništi
  20. proslijedio/la je Tweet
    5. stu 2019.

    Hacking Tools Cheat Sheet.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·