Tweetovi

Blokirali ste korisnika/cu @kmkz_security

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @kmkz_security

  1. Prikvačeni tweet
    24. sij

    Post-exploitation tip: Do you know how to trivially & remotely hijack an session without prompt nor warning on user's side using signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details:

    Poništi
  2. proslijedio/la je Tweet
    prije 16 sati

    I’ve just uploaded my Jailbreak for the iPad Pro (2017) to GitHub. Right now, SSH and Sileo can be installed. Due to lack of devices, I cannot currently implement support for other devices. Feel free to create PRs if you would like to help me!

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Pointer Compression in V8 and what it means for browser exploitation by

    Poništi
  4. proslijedio/la je Tweet
    25. sij

    Some notes on PoshC2, operational considerations + a couple of tweaks to default beacons which might reduce exposure to Blue team

    Poništi
  5. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    SettingSyncHost.exe as a LolBin cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo

    Poništi
  8. proslijedio/la je Tweet

    Cobalt Strike kit for Lateral Movement

    Poništi
  9. proslijedio/la je Tweet
    31. sij

    "Dark sides of Java remote protocols" by

    Poništi
  10. proslijedio/la je Tweet
    31. sij
    Poništi
  11. proslijedio/la je Tweet
    31. sij
    Poništi
  12. proslijedio/la je Tweet
    31. sij

    CVE-2019-1406 : Microsoft Jet Engine ColumnLvText Type Confusion CVE-2019-1250 : Microsoft Jet database Record::IsNull Memory Corruption Found by &

    Poništi
  13. proslijedio/la je Tweet
    31. sij
    Poništi
  14. proslijedio/la je Tweet
    31. sij
    Poništi
  15. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  16. proslijedio/la je Tweet
    31. sij

    Wrote a post on how to use GadgetToJScript with Covenant & Donut Thanks to for the answering my queries and helping me while exploring tool 🙏

    Poništi
  17. proslijedio/la je Tweet
    31. sij
    Poništi
  18. proslijedio/la je Tweet
    31. sij

    Pushed a new Rubeus release after getting some additional feedback from our most recent AT:RTO students. The full changes are detailed here . To highlight a few new features- "/nowrap" globally prevents base64 blobs from line-wrapping, (1/4)

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    30. sij
    Poništi
  20. proslijedio/la je Tweet
    31. sij

    Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    30. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·