Blacaman

@hycata

El conocimiento por sí solo no basta, lo que lo hace realmente grande es poder compartirlo con otros..

Vrijeme pridruživanja: svibanj 2016.

Tweetovi

Blokirali ste korisnika/cu @hycata

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @hycata

  1. proslijedio/la je Tweet

    Cobalt Strike kit for Lateral Movement

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Tracking REvil : ( 150k unique infections, extracted ransom demands from 148 samples together demanding more than 38 million dollars)

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    OK Google - Bypass the authentication! (How a chain of vulnerabilities lead to special world working as a passpartout for a Google Assistant application) : cc

    Poništi
  4. proslijedio/la je Tweet
    1. velj
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Funny options (xmms2d): --yes-run-as-root Give me enough rope to shoot myself in the foot

    Poništi
  6. proslijedio/la je Tweet
    1. velj

    https://instagram.verylongdomainnamethannoonewantstoread.duckdns[.]org/ What a domain... 😂 And what's interesting: it resolves to an IP (which seems in a Serbian ISP's dynamic range - "CPE-DYNAMIC-BELGRADE") that has... Check 2nd screen. 🤔 cc

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    31. sij

    Here's a new way to deploy and update Sysmon on your Windows endpoints :

    Poništi
  8. proslijedio/la je Tweet
    1. velj

    Kali Linux 2020.1 Release - Penetration Testing and Ethical Hacking Linux Distribution

    Poništi
  9. proslijedio/la je Tweet
    1. velj

    Hardware Debugging for Reverse Engineers (Part 1) : SWD, OpenOCD and Xbox One Controllers : cc

    Poništi
  10. proslijedio/la je Tweet
    31. sij

    PythonAESObfuscate - Obfuscates A Python Script And The Accompanying Shellcode

    Poništi
  11. proslijedio/la je Tweet
    1. velj
    , , i još njih 7
    Poništi
  12. proslijedio/la je Tweet
    1. velj

    Critical Flaw in Trezor Hardware Wallets (attack relies on voltage glitching to extract an encrypted seed ,crack the encrypted seed which is protected by a 1-9 digit PIN) : : Demo:

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    ApplicationInspector - A Source Code Analyzer Built For Surfacing Features Of Interest And Other Characteristics...

    Poništi
  14. proslijedio/la je Tweet
    1. velj
    Poništi
  15. proslijedio/la je Tweet
    1. velj

    Blinder - A Python Library To Automate Time-Based Blind SQL Injection

    Poništi
  16. proslijedio/la je Tweet
    31. sij
    Poništi
  17. proslijedio/la je Tweet
    31. sij
    Poništi
  18. proslijedio/la je Tweet
    1. velj

    RE just retired from . As the creator of the box, I tried to bring phishing/macro obfuscation concepts to the initial access. The intended privescs were the WinRar ACE file exploit, and XXE in Ghidra. I'll show two unintended privescs too.

    Poništi
  19. proslijedio/la je Tweet
    1. velj

    This never gets old, so I'll never stop periodically sharing it.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·