Tweetovi

Blokirali ste korisnika/cu @jookermoon

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jookermoon

  1. prije 7 sati
    Poništi
  2. proslijedio/la je Tweet
    16. pro 2019.
    Poništi
  3. prije 7 sati
    Poništi
  4. proslijedio/la je Tweet

    🆕🛠️ release: Vba2Graph Generates VBA call graphs, with potential malicious keywords highlighted. Assists in: ✅ Analyzing big malicious macros. ✅ Understanding of the execution flow. ✅ Identifying campaign similarity patterns.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    20. sij
    Poništi
  6. proslijedio/la je Tweet
    17. lis 2019.

    The Linux Forensics workshop (labs, slides, forensic images "E01")+talk done at 2019, is now available here:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    17. lis 2019.

    (remember) Slides from my presentation at DEF CON 27 -- .NET Malware Threat: Internals and Reversing:

    Poništi
  8. proslijedio/la je Tweet
    21. lis 2019.

    finished my first win32 reverse shell shellcode, thanks to everyone who has published content on the subject, i tried to call out every reference i used.

    Poništi
  9. proslijedio/la je Tweet
    23. lis 2019.

    We are back with our new blog on "Windows Priv Escalation via DLL Hijacking". The application which is taken as an example for demo is part of Fine Dining Project which was part of CIA project and was disclosed by WikiLeaks. Share your love as feedback ❤️

    Poništi
  10. prije 7 sati
    Poništi
  11. prije 7 sati
    Poništi
  12. proslijedio/la je Tweet
    1. pro 2019.

    Custom Malware Development (Establishing A Shell Through the Target’s Browser) - Repurposing & AutoIt

    Poništi
  13. 2. velj

    Cyber criminals using Coronavirus emergency to spread malware qua

    Poništi
  14. proslijedio/la je Tweet
    30. sij
    Poništi
  15. proslijedio/la je Tweet
    29. sij

    AD Privilege Escalation Exploit: The Overlooked ACL

    Poništi
  16. proslijedio/la je Tweet

    🎉 New blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous / package using coverage-guided fuzzer. ➡️ Fuzzer: Jsfuzz by ➡️ Target: wasm-parser ➡️ Bug: DoS/OOM

    Poništi
  17. 30. sij
    Poništi
  18. proslijedio/la je Tweet
    27. sij
    Poništi
  19. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    29. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·