Tweetovi

Blokirali ste korisnika/cu @jkfourtwo

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jkfourtwo

  1. proslijedio/la je Tweet
    3. velj

    TeamViewer stored user passwords encrypted, not hashed, and the key is now public

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  3. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  4. proslijedio/la je Tweet
    27. sij

    Just pushed a somewhat big update to SILENTTRINITY with a lot of forward compatibility fixes for Python 3.8 and made the PowerShell "stageless" stager public. Plus more modules and bug fixes

    Poništi
  5. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    13. sij

    I've been poking around the Windows kernel a lot lately and one of my favorite samples I've referenced is Mimikatz's driver, Mimidrv. I took some time and documented all of its functions and included some write-ups on important kernel structures. Post: 1/3

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    18. sij

    The long-awaited Black Hat Go is releasing on 2/4/20! If your shipping address has changed since you ordered the book, please email info@nostarch.com. And if you haven't ordered the book yet, there's still time to get 30% off a preorder at !

    Poništi
  8. proslijedio/la je Tweet
    17. sij

    I spent some time learning about blockdlls and parent process spoofing from and . Using a recent sample from SubTee, I modified it to spoof the parent process and inject x64 shellcode from a dll on UNC into hidden iexplore.exe.

    Poništi
  9. proslijedio/la je Tweet

    An astrophotographer has clicked an exceptional video, wherein we can feel the rotation of the earth Using a tracking mount, aligned with North Star, he kept clicking images every 12 seconds for the next 3 hours. The camera is looking at the same portion of the Milky Way Fab!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi
  11. 30. pro 2019.

    This didn’t help me solve the objective in the end, but was fun nevertheless...

    Poništi
  12. proslijedio/la je Tweet
    28. pro 2019.

    My Signature Creation Mind Map Input: Sample > the things that I check to create YARA signatures, Sigma rules or IOCs > or pivot to related samples in order to improve the signatures / rules

    Poništi
  13. proslijedio/la je Tweet
    27. pro 2019.

    SharpSploit v1.5 is out! Includes amazing work from , , , , and . Includes: lateral movement over SCM and PSRemoting, an AMSI bypass, CreateProcessWithToken, and DynamicInvoke improvements. 🔥🔥🔥

    Poništi
  14. 18. pro 2019.

    „Everyone loves ed because it’s ED!“

    Poništi
  15. proslijedio/la je Tweet
    15. pro 2019.
    Poništi
  16. proslijedio/la je Tweet
    14. pro 2019.
    Poništi
  17. proslijedio/la je Tweet
    12. pro 2019.

    Learn how to exploit Symantec Endpoint Protection on all versions of Windows (CVE-2019-12750). Part 2 of this series by delves into a more advanced method of exploitation!

    Poništi
  18. proslijedio/la je Tweet

    It’s officially official! Santa and the elves just officially launched the 2019 SANS Challenge with KringleCon 2: Turtle Doves! Please join the fun! Happy holidays from the the whole SANS Holiday Hack team!

    Poništi
  19. proslijedio/la je Tweet
    11. pro 2019.

    [New blog] Updating adconnectdump - a journey into DPAPI; In which I describe the process of understanding and decrypting the DPAPI encrypted credentials of Azure AD connect. This again enables dumping these credentials via only network calls (as admin).

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    10. pro 2019.

    Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! More than 3000 tools and about 600 posts.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·