Hugo Rifflet

@l3m0ntr33

IT Security Satellite

Vrijeme pridruživanja: siječanj 2012.

Tweetovi

Blokirali ste korisnika/cu @l3m0ntr33

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @l3m0ntr33

  1. proslijedio/la je Tweet
    5. velj

    Tetrane launches REVEN Professional Edition! You were many to request and wait for a lighter, more accessible, more affordable version of REVEN. Here it is! REVEN Pro democratizes full-system timeless analysis for vulnerability and malware analysis.

    Poništi
  2. proslijedio/la je Tweet
    5. velj

    We've been speaking about it for almost 2y. We've been making it for more than 1y. And soon we will unleash it. TheHive 4. A brand new architecture, more than 40k lines of Scala code, multi-tenancy, RBAC & much more. That's . Done right 💪🏼

    Poništi
  3. proslijedio/la je Tweet
    4. velj
    Poništi
  4. proslijedio/la je Tweet
    3. velj

    Jeu du lundi: identifier l'entreprise qui recherche son CERT Manager (bien payé pour le coup). Les chiffres m'indiquent Thalès mais je ne vois pas où Thalès aurait besoin d'un CERT Manager. Une idée ?

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    I've spent a whole day on Sigma Focus: Facilitate contributions - New Rule Creation Guide - New colorised test output - New test cases - Rule cleanup (title, date, ids) Next step: How-to guide for pull requests

    Poništi
  7. proslijedio/la je Tweet
    31. sij

    Petite précision sur le tweet pour les postes dans mon labo. Tous papiers acceptés quelque soient l'endroit sur la planete, l'école paie le déplacement. L'école paie aussi le déplacement pour 2 confs par an. Evidemment si la conf coute plus de 500 euros, il y aura discussion

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    Au fait si tu en as marre de faire du caca dans ta boîte et que tu aimes la recherche en secu, les étudiants et que tu cherches pas un salaire comme chez Google mon labo recrute deux personnes à temps plein. PM ouvert !

    Poništi
  9. proslijedio/la je Tweet
    29. sij
    Poništi
  10. proslijedio/la je Tweet
    29. sij

    Bravo à l’équipe classée seconde au challenge Forensic! Chaque membre remporte un an d’abonnement à MISC

    Poništi
  11. proslijedio/la je Tweet
    28. sij

    It’s with great pleasure I'm (finally) releasing my docker images. Images are optimised for home and enterprise use. Some cleanup work to do (see issues), but its been in prod for months now. Github: DockerHub:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    29. sij

    HEVD -- Arbitrary Write, Win7 x86 thanks to all the sourced bloggers, content producers, elders

    Poništi
  13. proslijedio/la je Tweet
    28. sij

    1\ Surprisingly, you could build a very mediocre PE malware detector with a single PE feature: the PE compile timestamp. In fact, I built a little random forest detector that uses only the timestamp as its feature that gets 62% detection on previously unseen malware at a 1% FPR.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    28. sij
    Odgovor korisniku/ci

    why our office is switching to Fortnite

    Poništi
  15. proslijedio/la je Tweet
    27. sij

    What issues do people have with a rollout in an enterprise? Log volume? I’ve seen orgs worried about 20GB of daily Sysmon log data, while at the same time spending a 6 figure sum on a license to process 500GB of daily firewall log data. (which is mostly useless)

    Poništi
  16. proslijedio/la je Tweet
    26. sij

    Log Sources - ordered by priority - with ratings in different categories - personal and highly subjective assessment - from my most recent slide deck on low hanging fruits in security monitoring

    Poništi
  17. proslijedio/la je Tweet
    27. sij

    📺 New Tutorial Video 📺 Learn how to automaticaly decrypt strings with and python 🐍 The 4th part in our reverse engineering deep-dive series. 👾🔍

    Poništi
  18. proslijedio/la je Tweet

    Notorious downloader Trojan sLoad's version 2.0, Starslord, has new functionality that can track the stage of infection + an anti-analysis trap that can identify and profile analyst machines. Learn how these new powerful features can pose even higher risk:

    Poništi
  19. proslijedio/la je Tweet
    26. sij

    The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    23. sij

    Sharing a new demo + an article on BlueKeep dissection (CVE-2019-0708) using REVEN. See how data Tainting, Memory History, and its Python API streamline the RE process to quickly and accurately analyze the root-cause and behavior at the system level.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·