Javier Buján

@javierbujanc

Security lover. Pentesting, Forensics, Sysadmin, ...

Vrijeme pridruživanja: lipanj 2011.

Tweetovi

Blokirali ste korisnika/cu @javierbujanc

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @javierbujanc

  1. proslijedio/la je Tweet

    sysmon-modular | A Sysmon configuration repository for everybody to customise

    Poništi
  2. proslijedio/la je Tweet
    5. velj

    InfoCon // Hacking Conference Archive La mayor recopilación de música, vídeos, documentación, talleres, charlas, podcasts, etc #2600 etc

    Poništi
  3. proslijedio/la je Tweet
    4. velj
    Poništi
  4. proslijedio/la je Tweet
    4. velj
    Poništi
  5. proslijedio/la je Tweet
    30. sij

    Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  6. proslijedio/la je Tweet
    28. sij

    From the folks that brought you Atomic Red Team, Chain Reactor is a new open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.

    Poništi
  7. proslijedio/la je Tweet
    30. sij
    Poništi
  8. proslijedio/la je Tweet
    28. sij

    hacker-roadmap : A guide for amateurs pen testers and a collection of hacking tools, resources and references to practice ethical hacking, pen testing and web security : cc

    Poništi
  9. proslijedio/la je Tweet
    28. sij

    Kali 2020.1 is up for download! Big changes yet again, with non-root user by default, a single installer image for multiple desktop enviroments, updates to themes, and more! Not to mention Rootless NetHunter!

    Poništi
  10. proslijedio/la je Tweet
    27. sij
    Poništi
  11. proslijedio/la je Tweet
    27. sij
    Poništi
  12. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    27. sij

    Unfurl : It takes a URL and expands ("unfurls") it into a directed graph, extracting every bit of information from the URL and exposing the obscured : cc

    Poništi
  14. proslijedio/la je Tweet
    26. sij
    Poništi
  15. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    25. sij
    Poništi
  17. proslijedio/la je Tweet
    23. sij

    Por aquí os dejo un vídeo de 2 horas que acabo de subir al canal en el que os enseño a crear un reporte profesional en LaTeX desde cero. ¡Espero que os guste y que os sea de provecho para el día a día!

    Poništi
  18. proslijedio/la je Tweet
    21. sij

    30 Linux System Monitoring Tools Every SysAdmin Should Know - nixCraft

    Poništi
  19. proslijedio/la je Tweet
    17. sij
    Poništi
  20. proslijedio/la je Tweet
    17. sij

    Awesome-Red-Teaming: List of Awesome Red Teaming Resources:-

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·