JaeRyoung Oh

@h4z3dic

Blackfort Security, Inc. Co-Founder & CEO

Seoul
Vrijeme pridruživanja: lipanj 2009.

Tweetovi

Blokirali ste korisnika/cu @h4z3dic

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @h4z3dic

  1. proslijedio/la je Tweet
    prije 4 sata

    Hey bug hunters! Want a look at some of the top vulnerabilities ever found on ? They just released the last blog post I wrote before leaving. Enjoy!

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 4 sata

    BurpSuite 2020.01 Release Review, Change HTTP Message Editor! New post by , ,

    Poništi
  3. proslijedio/la je Tweet
    prije 8 sati
    Poništi
  4. proslijedio/la je Tweet

    This enigma-simulator project is an educational tool which simulates the workings of an Enigma machine, the Germans' main military encryption tool during World War II.

    Poništi
  5. proslijedio/la je Tweet
    prije 22 sata

    GitHub - mufeedvh/CVE-2019-8449: CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4 -

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by You can find it here:

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    VSCode x * VSCode based GUI * Interactive terminal * Remote file browser (Yes!) * Open source Not on market yet. But you can built it from the source:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    2. velj

    checkm8 PoC for macOS (T7000 only for now)

    Poništi
  9. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  10. proslijedio/la je Tweet
    2. velj

    hashlookup - A Python implementation of Crackstion's Hash Lookup

    Poništi
  11. proslijedio/la je Tweet
    2. velj

    Pointer Compression in V8 and what it means for browser exploitation by

    Poništi
  12. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  13. proslijedio/la je Tweet
    2. velj
    Poništi
  14. proslijedio/la je Tweet
    2. velj
    Poništi
  15. proslijedio/la je Tweet
    1. velj

    New SpiderFoot 3.0 tutorial showing how to extract and addresses from websites, with automated blockchain querying to get balances using the SpiderFoot 3.0 CLI.

    Poništi
  16. proslijedio/la je Tweet
    1. velj

    Here is my writeup for Facebook's BountyCon 2020 CTF. Was not able to give much time but enjoyed solving a couple of challenges.🧑‍💻

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    1. velj
    Poništi
  18. proslijedio/la je Tweet
    1. velj

    Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet

    Apple Continuity Protocol Reverse Engineering and Dissector

    Poništi
  20. proslijedio/la je Tweet

    Small POC in powershell exploiting hardlinks during the VM deletion process

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·