-
Let’s make noise for
@jaysonstreet and the great talk we had during#BHEU in London!
If you want to find out how to avoid becoming a target of social engineering and why robbing the right bank is so important, watch the video below!
https://cqu.re/jayson
#stayCQURE -
How to protect yourself from becoming a target of social engineering?
Watch our special #BHEU interview with@jaysonstreet and find out! P.S.@PaulaCqure made sure to ask Jason the most burning question, so you’d better click “play” now!
https://cqu.re/jayson -
Can't wait to present the progress we've made since
#BHEU at@offensive_con! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.#offensiveconpic.twitter.com/xfEaCdgraH
-
The recording of my talk "Unveiling the Underground World of Anti-Cheats" at BlackHat Europe 2019 is now online! :D A pleasure to be part of
@BlackHatEvents !! https://www.youtube.com/watch?v=yJHyHU5UjTg …#BHEU#security#infosecPrikaži ovu nit -
Five
#BHEU Briefings recordings are now available on the#BlackHat YouTube Channel. Watch them here:http://ow.ly/501R50xJcQt -
My
@BlackHatEvents slides on "Unveiling the Underground Word of Anti-Cheats" are now available on the@Immunityinc site. You can find additional information about bypasses to multiple Anticheats (new info at the end) https://immunityinc.com/resources/papers-presentations.html …#reversing#security#BHEU#Blackhatpic.twitter.com/PgsluKijFE
-
Slides and material from our talk on attacking container build systems from
#BHEU are now online: https://github.com/heroku/bheu19-attacking-cloud-builds … And so is Terrier, the CI-oriented container integrity verification tool (mainly due to the amazing effort of the@brompwnie):https://github.com/heroku/terrier/ -
Thanks to all of the
#BHEU 2019 Arsenal Presenters, Attendees and of course the@ToolsWatch Team for a great showing of open-source tools!https://twitter.com/ToolsWatch/status/1202629316737208320 …
-
Ok folks that's a wrap !!!! Thanks everyone for making this
#BHEU Arsenal London 2019 an awesome place to catch up with old and new friends from all over the world !! Hugs to@Jasminanicolee Steve Rich and@BlackHatEvents ... Special hugs to our beloved chairhacker@MadelineS_Mpic.twitter.com/XIGgArXX1n
-
Slides for
@ms_s3c and my talk on fuzzing at#BHEU are now available: https://hexgolems.com/2019/12/hotfuzz/ … -
للتو انتهيت من عرض أداة برق بنجاح في مؤتمر بلاكهات لندن بحمدالله. Just finished presenting barq in
#BHEU Arsenal. Barq is the AWS post exploitation attack tool. Find it here: https://github.com/Voulnet/barq@ToolsWatch pic.twitter.com/HCYoMr1eUV
-
Final slides of my presentation yesterday at Black Hat Europe 2019, about malicious VBA macros and recent advances in the attack & defence sides: https://www.decalage.info/bheu2019 Featuring
#oletools/olevba, ViperMonkey, MacroRaptor, EvilClippy#BHEU#BHEU2019pic.twitter.com/iT8iqvIM8E
-
Do you want to know how to use Windows Event Logs to improve your detection, matched to MITRE ATT&CK? Join my session at
@BlackHatEvents Arsenal station 6 at 3:45 p.m. and find out how my open source tool#EventList can help you!#BHEU pic.twitter.com/z7GM3MGOUT
-
Today
@ScepticCtf presented our work on Siemens S7-1200v4 bootloader reversing at#bheu. We will present more about Siemens ADONIS RTOS later this year at#36c3 and will present the most complete package including releasing the code for using the special access feature at#S4x20.pic.twitter.com/Q5E5ITLFfb
-
Next up... I want to be James Kettle
@albinowax when I grow up. He's singlehandedly made appsec sexy again after years of hardly any decent research. This little trick will make the bug bounty scene go mad.#BHEU pic.twitter.com/BxjEgKRDW7
Prikaži ovu nit -
Insights into the business of a new Android botnet called Geost.
@eldracote@anshirokova and@MaryJo_E revealing the secrets of a cybercrime group at#BlackHatEurope2019#BlackHat#BHEU pic.twitter.com/XaXKwWXS6q
-
I'm sure when I look back at Black Hat Europe 2019, one of my favorite moments will be "That time
@MalwareJake cosplayed as China."
#bheu#blackhatpic.twitter.com/yRqMPM9CpY
-
TheTHE (The Thread Hunting Experience) es el nombre de la herramienta que presentan hoy
@ssantosv,@dgn1729 y@psaneme en@BlackHatEvents. ¿Quieres saber más? Lee nuestro post
http://ow.ly/6AgA30pYTnu
Info oficial del evento
http://ow.ly/xlro30pYTnO
#SoloHackers#BHEU pic.twitter.com/kxnMno7rCR
-
#oletools 0.55 is finally out, just in time for#BHEU! Main changes: olevba += SLK file parser and XLM macro extraction, VBA stomping detection More info: https://github.com/decalage2/oletools/releases/tag/v0.55 … How to install/update: pip install -U oletoolspic.twitter.com/zGEJqoQRUy
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.