h0rxh

@h0rxh

Threat hunter, digital forensic and incident response, CREST certified ethical hacker and malware investigator

Vrijeme pridruživanja: siječanj 2010.

Tweetovi

Blokirali ste korisnika/cu @h0rxh

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @h0rxh

  1. Prikvačeni tweet
    10. kol 2018.
    Poništi
  2. proslijedio/la je Tweet
    1. velj
    Poništi
  3. proslijedio/la je Tweet
    1. velj
    Poništi
  4. proslijedio/la je Tweet
    1. velj
    Poništi
  5. proslijedio/la je Tweet
    1. velj

    OK Google - Bypass the authentication! (How a chain of vulnerabilities lead to special world working as a passpartout for a Google Assistant application) : cc

    Poništi
  6. proslijedio/la je Tweet
    2. velj
    Poništi
  7. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  8. proslijedio/la je Tweet
    31. sij
    Poništi
  9. proslijedio/la je Tweet
    30. sij

    Interested in learning how to debug macros or learn more about the structure of user forms? In my latest video, I show you how to use the Office IDE to debug a recent

    Poništi
  10. proslijedio/la je Tweet
    31. sij

    Very good article about "Exploiting email address parsing with AWS SES"! It's very similar to the bug I found in the Python email address parsing function last year

    Poništi
  11. proslijedio/la je Tweet
    31. sij

    PHP 0day : PHP 7.0-7.4 disable_functions bypass : Some more Exploits :

    Poništi
  12. 31. sij

    Just finished a Run on for 1 hour, 25 minutes, 46 seconds going 12300.7m. .

    Poništi
  13. proslijedio/la je Tweet
    30. sij
    Poništi
  14. proslijedio/la je Tweet
    28. sij

    simple yara rule to detect suspicious windows servicedll, e.g. 2nd match is related to APT sample "mshlpsrvc.dll"

    Poništi
  15. proslijedio/la je Tweet
    27. sij

    memhunter : Live hunting of code injection techniques : cc

    Poništi
  16. proslijedio/la je Tweet
    26. sij

    and use Windows scheduled tasks to persist and move. When responding: 1. When was the task created? 2. Which account created it? 3. What does the task do? 4. Where did attacker come *from* to auth and create the task? Establish new leads and pursue them.

    Poništi
  17. proslijedio/la je Tweet
    27. sij

    Lateral movement techniques abuse DCOM technology - thanks for sharing !

    Poništi
  18. proslijedio/la je Tweet
    25. sij
    Poništi
  19. proslijedio/la je Tweet
    25. sij
    Poništi
  20. proslijedio/la je Tweet
    24. sij

    PoC (DoS) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE

    Poništi
  21. proslijedio/la je Tweet
    24. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·