Karmatr0n

@karmatr0n

Programming, Networking, Unix, Mobile and Computer Security. Always Learning.

nowhereland
Vrijeme pridruživanja: svibanj 2014.

Tweetovi

Blokirali ste korisnika/cu @karmatr0n

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @karmatr0n

  1. proslijedio/la je Tweet
    2. velj

    wireshark dissector for Apple’s propriety continuity protocol

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  3. proslijedio/la je Tweet
    24. sij

    If you have ATP enable the NO-DEFAULT protections: 1)block office apps from creating child process and inject code to other process2)Block JS &VBS from launching downloaded executable content 3)Block credential stealing from lsass.exe and much more

    Poništi
  4. proslijedio/la je Tweet
    25. sij

    I'm at a bar demanding people identify Ukraine on a map

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet

    Hoping to do a livestream on patch analysis / reversing of the RDP Gateway vulns. Haven't done any streams in forever and miss doing them.

    Poništi
  6. proslijedio/la je Tweet
    24. sij

    In our latest blog on threat actors exploiting CVE-2019-19781, , , & I delve into financially motivated threat actor who exploited CVE-2019-19781, scanned internally for EternalBlue & deploy ransomware (code family still under analysis)

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    24. sij
    Poništi
  8. proslijedio/la je Tweet
    24. sij

    We're beyond stoked on the cutting edge macOS & iOS research, to be presented by world-class security researchers at "Objective by the Sea" v3.0: 🤗😍 Register today:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    Unsurprisingly, ransomware gangs like Sodinokibi are using vulnerabilities such as the ones in Citrix and PulseVPN to gain entry into a network, then leveraging Windows exploits like EternalBlue to pivot internally.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    24. sij

    Hi, hello. I am recruiting for a senior C++ position. You must also know Rust, Kubernetes, JavaScript, PHP, and Brainfuck. We will give you $1 and 0 days off. But we have a ping pong table and beer. Plz work 4 us after 18 rounds of whiteboarding. Ur impressive.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    24. sij
    Poništi
  12. proslijedio/la je Tweet

    Proof of Concept scanner for CVE-2020-0609 & CVE-2020-0610.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    24. sij
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    24. sij

    2020-01-23 - German pushes - 4 email examples, a of the infection traffic, the associated malware/artifacts, and some IOCs available at:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    22. sij

    We are committed to the security of our products & we are making every effort to ensure all customers are supported in response to . To that end, we have teamed up with on a scanner that aids customers in the detection of compromise.

    Poništi
  16. proslijedio/la je Tweet

    Señales de humo.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    21. sij

    Banda NoTrustSec! Buenas noticias, ya estamos listos para verlos este viernes 24 a las 7 pm, en las instalaciones de en CDMX 🙌🏼 En un momento más compartimos el Link con el detalle de las charlas, las primeras del 2020 🙂Aparten su viernes :) estará bueno este 1er meetup

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    16. sij
    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    17. sij

    We found an unexpected development with the Citrix Netscaler vulnerability. A seemingly “white knight” who left a backdoor to deploy additional malware while keeping out other criminals.

    Poništi
  20. proslijedio/la je Tweet
    16. sij

    CVE-2020-0601 - PoC for code signing PE files using a Certificate Authority using ECC

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·