Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @h0rxh
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @h0rxh
-
Prikvačeni tweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
h0rxh proslijedio/la je Tweet
Practical Web Cache Poisoning
#infosec#pentest#bugbountyhttps://portswigger.net/research/practical-web-cache-poisoning …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
Reversing XignCode3 Driver – Registering Notify & Callback Routines: https://niemand.com.ar/2020/01/31/reversing-xigncode3-driver-part-4-1-registering-notify-and-callback-routines/ … 3)Analyzing dispatch functions: https://niemand.com.ar/2020/01/24/reversing-xigncode3-driver-part-3-analyzing-dispatch-functions/ … 2)Analyzing init functions: https://niemand.com.ar/2020/01/16/reversing-xigncode3-driver-part-2-analyzing-init-functions/ … 1)Identifying the Driver Entry Pt: https://niemand.com.ar/2020/01/08/reversing-xigncode3-driver-part-1-identifying-the-driver-entry-point/ … cc
@niemand_secHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
Exploring the iOS screen frame-buffer– a kernel reversing experimenthttps://medium.com/@bellis1000/exploring-the-ios-screen-frame-buffer-a-kernel-reversing-experiment-6cbf9847365 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
OK Google - Bypass the authentication! (How a chain of vulnerabilities lead to special world working as a passpartout for a Google Assistant application) : https://techblog.mediaservice.net/2020/01/ok-google-bypass-the-authentication/ … cc
@s0wdustpic.twitter.com/wDKlZ1ClWu
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
7-Zip: From Uninitialized Memory to Remote Code Execution
#infosec#pentest#bugbounty#exploitDevhttps://landave.io/2018/05/7-zip-from-uninitialized-memory-to-remote-code-execution/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
#FakeLogonScreen is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with#CobaltStrike's execute-assembly command. https://github.com/bitsadmin/fakelogonscreen …pic.twitter.com/2pAOk9InLMHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
RiceTeaCatPanda CTF 2020 Write-Up https://0xkasper.com/articles/rtcp-ctf-2020-write-up …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
Interested in learning how to debug macros or learn more about the structure of user forms? In my latest video, I show you how to use the Office IDE to debug a recent
#emotet#maldoc https://youtu.be/xcRPhm5iRdo pic.twitter.com/ALBIp7wq2Q
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
Very good article about "Exploiting email address parsing with AWS SES"! It's very similar to the bug I found in the Python email address parsing function last year https://nathandavison.com/blog/exploiting-email-address-parsing-with-aws-ses …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
PHP 0day : PHP 7.0-7.4 disable_functions bypass : https://github.com/mm0r1/exploits/tree/master/php7-backtrace-bypass … Some more Exploits :https://github.com/mm0r1/exploits
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just finished a Run on
@Strava for 1 hour, 25 minutes, 46 seconds going 12300.7m. https://ift.tt/36MUEyJ#running.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
Part II: Returning to Adobe Reader symbols on macOS https://googleprojectzero.blogspot.com/2020/01/part-ii-returning-to-adobe-reader.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
simple
#threathunting yara rule to detect suspicious windows servicedll, e.g. 2nd match is related to#Konni APT sample "mshlpsrvc.dll"pic.twitter.com/VN6vtcPYpj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
memhunter : Live hunting of code injection techniques : https://github.com/marcosd4h/memhunter … cc
@marcosd4hpic.twitter.com/wkuRUx3JuQHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
h0rxh proslijedio/la je Tweet
Lateral movement techniques abuse DCOM technology - thanks for sharing
@PhilipTsukerman !#infosec#pentest#redteamhttps://www.cybereason.com/blog/dcom-lateral-movement-techniques …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
VULNERABILITY ASSESSMENT, PENETRATION TESTING, REDTEAMING…OH MY GOD!
#infosec#pentest#redteamhttps://www.sentinelone.com/blog/vulnerability-assessment-penetration-testing-redteaming-oh-my-god/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
In-Memory Evasion - 5 great videos
#infosec#pentest#redteamhttps://blog.cobaltstrike.com/2018/02/08/in-memory-evasion/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
PoC (DoS) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCEhttps://github.com/ollypwn/BlueGate …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
h0rxh proslijedio/la je Tweet
Analyzing Modern Malware Techniques - Part 1 : https://0x00sec.org/t/analyzing-modern-malware-techniques-part-1/18663 … Part 2 :https://0x00sec.org/t/analyzing-modern-malware-techniques-part-2/18765/1 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.