Tweetovi

Blokirali ste korisnika/cu @h4wkst3r

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @h4wkst3r

  1. 3. velj

    This is a great conference, I would highly recommend submitting!

    Poništi
  2. 31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  3. 28. sij
    Poništi
  4. proslijedio/la je Tweet
    24. sij
    Poništi
  5. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  6. proslijedio/la je Tweet
    22. sij

    BREAKING - To help organizations identify compromised systems with CVE-2019-19781, & have released a tool that searches for indicators of compromise associated with attacker activity observed by

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    19. sij

    command-line MSBuild.exe detection's got your down? How about MSBuild without MSBuild.exe?

    Poništi
  8. proslijedio/la je Tweet
    11. sij

    PoisonHandler - Registering a protocol handler remotely and invoke it to execute arbitrary code on the remote host

    Poništi
  9. proslijedio/la je Tweet
    11. sij

    We have just released a new tool for exploiting CVE-2019-19781. Our goal was to keep private as long as possible to have a longer window to fix. Other researchers have published the exploit code in the wild already. Cats out of the bag.

    Poništi
  10. proslijedio/la je Tweet
    9. sij

    Spray-AD, a new Kerberos password spraying tool for Cobalt Strike that might come in handy when assessing Active Directory environments for weak passwords (generates event IDs 4771 instead of 4625).

    Prikaži ovu nit
    Poništi
  11. 5. sij

    Minor update (v1.0.1) to SharPersist that fixes a few bugs with the Windows service persistence technique -

    Poništi
  12. proslijedio/la je Tweet
    2. sij

    I was surprised SharpUp doesn't have the search for unquoted service path strings, which is by far the most common privesc that I see. So here ya go <3

    Poništi
  13. proslijedio/la je Tweet
    28. pro 2019.

    Just published some thoughts on red teaming, how to approach it, procure it and get in to it...

    Poništi
  14. proslijedio/la je Tweet
    17. pro 2019.

    It's that time of year again!!! 2020 CFP and CFT are both now officially open!!! SUBMIT!!!

    Poništi
  15. proslijedio/la je Tweet
    5. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    15. stu 2019.

    New dates - ArcticCon 2020 will run 20-22 October 2020 in Minnesota. The Call for Papers and Training will go out in April. If you're a red teamer, we hope to see you there.

    Poništi
  17. proslijedio/la je Tweet
    6. stu 2019.

    It's .NET Remoting story time, this week the case of the missing URI header and it's usefulness for a generic exploit payload. . Note, I might have gone overboard with the prose, sorry about that.

    Poništi
  18. 29. lis 2019.

    Lots of great blog posts have been coming out related to persistence from . Check it out!

    Poništi
  19. proslijedio/la je Tweet
    22. lis 2019.

    Release of UhOh365: Office365 email validation script. See if an email is a valid o365 email address before you send emails! Unlike previously disclosed vulns and similar scripts, this does NOT require a login attempt and is even more stealthy!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·