Rezultati pretraživanja
  1. prije 5 sati

    If you got hacked and threat actors pwnd your , here's how to make sure you've cleaned out golden tickets entirely

  2. prije 6 sati
    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
  3. prije 8 sati
  4. prije 11 sati
  5. prije 16 sati
  6. 4. velj

    actually works full in Win10 between 1903 and 1909? only with Last Issue? Thanks¡¡¡

  7. Will be in Tel Aviv for , for a talk about and DPAPI internals 🥳 Only the 5th (busy kiwi is busy), but with stickers 🥝 >

  8. 3. velj

    Check out our new trainings at TROOPERS : - Fuzzing source-code and binary-only targets like a pro - Mastering - Unplugged; Modern WiFi Hacking Your seat is waiting for you! 🙋🏼‍♂️🙋🏽

  9. 31. sij

    Uncovering ‘msv’ and collecting credentials through PyKD

  10. 29. sij

    If you want to grab me and speak (or ) you can find me in Malaga at the / -CSIRT join meeting. Final call for bugs / feedback / comment before the release of 2.8!

  11. Ho yes, unlike , it's not a Windows only source code. Works on Linux too, and others UNIX with recent SSL library. " , 9/10, will compile and link again"

  12. That epic Microsoft moment❤️ Recently worked on and ECC, so yes, 10 and 2016/2019 only. Previous versions like Windows 7 did not support personnal EC curves (only few NIST standard ones)

    Prikaži ovu nit
  13. 8. sij

    For the first time at we are offering a "Mastering Mimikatz" training by ! You will learn - Credential & secret extraction with DPAPI/DPAPI-NG; - Kerberos Security and abuse; - Use of tools for Research; - and more!

  14. 21. pro 2019.
  15. 6. pro 2019.

    How often do you see an actor's cheat sheet? Developers making tools used in the campaign left a text file with example commands in their tool. Psst, they love RDP and credential dumping with

  16. 30. stu 2019.

    pypykatz 0.3.0 is out. Now parsing dumps that can't parse :) New features: 1. better template selection. 2. greppable output 3. made place for upcoming NT support 4. supports external readers, like 's upcoming interface

    Prikaži ovu nit
  17. 29. stu 2019.

    Pour le week-end, voici un nouvel article présentant une technique pour lire le contenu d'un dump de lsass **à distance**, évitant ainsi la détection des AV () et le téléchargement de dumps volumineux (80-150Mo). Bon week-end ! 🙃

  18. 31. lis 2019.
  19. 31. lis 2019.

    done! PowerSploit -> Invoke-Mimikatz is now fixed on Win10 ver 1903 build 18362 here is the pull request / working script

  20. 18. lis 2019.

    I am a VERY lucky guy! I have 150 of my friends join me for my BDay conference in Helsinki! People from 20 countries flew in! Now we have the creator of ⁩ presenting!

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.