Rezultati pretraživanja
  1. Come check us out at this year in Vegas for an intense 4-day training on Attack and Defense - Hands-on Purple Team Simulations. I'll be there with the team!

  2. Magic Unicorn v3.8.2 released. Changes DllImport functionality for signature bypasses.

  3. Updated the Social-Engineer Toolkit (SET) to v8.0.3 - fixes python3 handling of sockets for BaseHTTPServer and credential harvesting.

  4. 4. velj

    New release of the Social-Engineer Toolkit version 8.0.2. Massive bug fixes and improvements.

  5. Come see the team at Blackhat this year with an incredible course focusing on Purple Teaming ! I’ll be there with everyone and really a great way to learn offense and defense.

  6. 31. sij

    Training for 2020 is open for registration! has a 4-day course called "Attack and Defense - Hands-on Purple Team Simulations." Secure early pricing until May 22!

  7. Really a dream come true! Happy to announce our brand new location in Fairlawn Ohio and creating a state of the art cyber security headquarters. Will have an advanced training center available for the industry, community and customers. So proud of the team at

  8. The pogo stick arrived.. it’s actually a pretty good workout 😂

  9. 29. sij

    We think should keep his job at after seeing his skills at the this morning 🎮

  10. Prikaži ovu nit
  11. Really excited about this program. We now have a dedicated program for new folks coming into infosec to get amazing training and employment from .

    Prikaži ovu nit
  12. 16. sij

    Exciting announcement from today! Find out what's coming next for 's bright ✨ and secure 🔒 future! From the Desk of the CEO: Securing the Future - Junior and Internship Programs | TrustedSec

  13. 11. sij

    We've just released a scanner that checks to see if a server is vulnerable for CVE-2019-19781. It does not actually exploit the target and is erfectly safe with no impact on the system.

    Prikaži ovu nit
  14. We’ve just released a blog from on IoCs, forensics, and how to identify if CVE-2019-19781 was exploited on your NetScalers/ADC.

  15. We will have a blog coming tonight from on forensics analysis and identifying if you've been hit with CVE-2019-19781. We've already done IOC analysis and how to best detect this in the wild.

  16. 11. sij

    We have just released a new tool for exploiting CVE-2019-19781. Our goal was to keep private as long as possible to have a longer window to fix. Other researchers have published the exploit code in the wild already. Cats out of the bag.

  17. Code all cleaned up and condensed in ports needed and interactive shell. Citrix CVE-2019-19781 unauthenticated exploit. Nice work ! Also added the ASCII art :)

  18. 10. sij
    Odgovor korisnicima

    awesome things as usual

  19. 9. sij

    This Friday, and founder will join founder of @lowvoltagenation on his podcast, for what will certainly be an informative conversation. Don't miss out!

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.