hex waxwing :(){ :|: &};:

@hexwaxwing

//FAILHUNTRESS//// curiosity takes precedence; thaasophobic. patterns + consilience + negative capability ftw. ¡in girum imus nocte et consumimur igni!

zeroville
Vrijeme pridruživanja: siječanj 2017.

Tweetovi

Blokirali ste korisnika/cu @hexwaxwing

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @hexwaxwing

  1. Prikvačeni tweet

    Your attitude is always a choice; never a prison.

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    Join me and on Tuesday, February 11th as we unveil 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards):

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Ever wanted to take a peek at the mimikatz sekurlsa::msv internals? New blog post is all about it plus, it also showcases PyKDumper, a tool that dumps LSASS credentials through WinDBG/PyKD.

    Poništi
  4. proslijedio/la je Tweet
    28. sij

    We've all received emails with no attachment and assume it's "safe" to open in a mail client (as long as we don't explicitly click on any URLs). Right? Not so much...

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    28. sij

    Qualys Security Advisory: LPE and RCE (CVE-2020-7247) in OpenSMTPD, OpenBSD's mail server. Erroneous logic in smtp_mailaddr() which validates user and domain. More details and PoC at: PS: "Did you ever play tic-tac-toe?"

    Poništi
  6. proslijedio/la je Tweet
    9. pro 2019.

    Education and expertise are critically important in . In "The Githubification of InfoSec," explains how we can use community knowledge to learn faster together, providing practical examples of open-source resources to help.

    Poništi
  7. proslijedio/la je Tweet
    27. sij

    nice blog post by summarizing replies to my question about modernizing a compiler course!

    Poništi
  8. proslijedio/la je Tweet
    27. sij

    Move Faster, Stay Longer blog about extending CS and tools to go with it.

    Poništi
  9. proslijedio/la je Tweet
    27. sij

    What are the temporal dynamics of malware outbreaks? Here's a simple model: an outbreak starts with slow growth, followed by takeoff, followed by a dwindling/taper. Detail image shows Zbot/Zeus, image grid shows other malware families. Work done w/ Giacomo Bergamo.

    Poništi
  10. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    24. sij
    Poništi
  13. proslijedio/la je Tweet
    24. sij

    modexp is one of my fav. researchers; while I often skim on details he is killing it with posts that combine an extensive and comprehensive research on interesting and often nuanced topics and a very well written narrative top quality right there

    Poništi
  14. proslijedio/la je Tweet
    Odgovor korisnicima

    OMG, this reminds me I forgot to tell you and that we made it into a recent edition of the Lutheran pastor network's weekly sermon:

    Poništi
  15. proslijedio/la je Tweet

    Something I've noticed over the years on the priority of vulns targeted by intention: - Bad guys scan the Internet for vulns because the vuln is effective - Security companies scan the Internet for vulns because the vuln is in the news

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  17. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    20. sij

    Happy to announce that you now can find the lecture notes for my Hardware and Embedded Systems Security course online, including tex sources:

    Poništi
  19. proslijedio/la je Tweet
    20. sij

    Friends, I am pleased to announce I have finished our zines collection! We've added: -doomriderz -inception -Immortal Riot -matrix -rRlf -VLAD All really cool stuff. All have absolutely incredible work. Check them out here: 1luv -smelly__vx

    Poništi
  20. proslijedio/la je Tweet
    19. sij

    ⏲️ As of today, we have about eighteen years to go until the Y2038 problem occurs. But the Y2038 problem will be giving us headaches long, long before 2038 arrives. I'd like to tell you a story about this.

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    18. sij

    Just published a blog post talking about some iOS kernel framebuffer research I’ve been looking at over the last couple weeks. Have a read if you’re interested :)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·