Rezultati pretraživanja
  1. prije 2 sata

    Let’s make noise for and the great talk we had during in London! 📣 If you want to find out how to avoid becoming a target of social engineering and why robbing the right bank is so important, watch the video below! 👇🏽

  2. prije 3 sata

    How to protect yourself from becoming a target of social engineering? 🔒 Watch our special interview with and find out! P.S. made sure to ask Jason the most burning question, so you’d better click “play” now! 🔥

  3. 27. sij

    Can't wait to present the progress we've made since at ! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.

  4. 7. sij

    The recording of my talk "Unveiling the Underground World of Anti-Cheats" at BlackHat Europe 2019 is now online! :D A pleasure to be part of !!  

    Prikaži ovu nit
  5. 28. pro 2019.

    Five Briefings recordings are now available on the YouTube Channel. Watch them here:

  6. 20. pro 2019.

    My slides on "Unveiling the Underground Word of Anti-Cheats" are now available on the site. You can find additional information about bypasses to multiple Anticheats (new info at the end)

  7. 6. pro 2019.

    Slides and material from our talk on attacking container build systems from are now online: And so is Terrier, the CI-oriented container integrity verification tool (mainly due to the amazing effort of the ):

  8. 6. pro 2019.
  9. 5. pro 2019.

    Thanks to all of the 2019 Arsenal Presenters, Attendees and of course the Team for a great showing of open-source tools!

  10. Ok folks that's a wrap !!!! Thanks everyone for making this Arsenal London 2019 an awesome place to catch up with old and new friends from all over the world !! Hugs to Steve Rich and ... Special hugs to our beloved chairhacker

  11. 5. pro 2019.

    Slides for and my talk on fuzzing at are now available:

  12. 5. pro 2019.

    للتو انتهيت من عرض أداة برق بنجاح في مؤتمر بلاكهات لندن بحمدالله. Just finished presenting barq in Arsenal. Barq is the AWS post exploitation attack tool. Find it here:

  13. 5. pro 2019.

    Final slides of my presentation yesterday at Black Hat Europe 2019, about malicious VBA macros and recent advances in the attack & defence sides: Featuring /olevba, ViperMonkey, MacroRaptor, EvilClippy

  14. 4. pro 2019.

    Do you want to know how to use Windows Event Logs to improve your detection, matched to MITRE ATT&CK? Join my session at Arsenal station 6 at 3:45 p.m. and find out how my open source tool can help you!

  15. 4. pro 2019.

    Today presented our work on Siemens S7-1200v4 bootloader reversing at . We will present more about Siemens ADONIS RTOS later this year at and will present the most complete package including releasing the code for using the special access feature at .

  16. Next up... I want to be James Kettle when I grow up. He's singlehandedly made appsec sexy again after years of hardly any decent research. This little trick will make the bug bounty scene go mad.

    Prikaži ovu nit
  17. 4. pro 2019.

    Insights into the business of a new Android botnet called Geost. and revealing the secrets of a cybercrime group at

  18. 4. pro 2019.

    I'm sure when I look back at Black Hat Europe 2019, one of my favorite moments will be "That time cosplayed as China." 😂

  19. TheTHE (The Thread Hunting Experience) es el nombre de la herramienta que presentan hoy , y en . ¿Quieres saber más? Lee nuestro post➡️ Info oficial del evento➡️

  20. 3. pro 2019.

    0.55 is finally out, just in time for ! Main changes: olevba += SLK file parser and XLM macro extraction, VBA stomping detection More info: How to install/update: pip install -U oletools

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.