Evangelos

@lex0tanil

get the job done

self.tar.gz
Vrijeme pridruživanja: rujan 2009.

Tweetovi

Blokirali ste korisnika/cu @lex0tanil

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @lex0tanil

  1. 1. sij
    Poništi
  2. proslijedio/la je Tweet
    13. pro 2019.

    In-depth analysis of PowerShell-based downloader Trojan sLoad, which uses the Background Intelligent Transfer Service (BITS) almost exclusively as alternative protocol for data exfiltration and most of its other malicious activities Details:

    Poništi
  3. proslijedio/la je Tweet
    Poništi
  4. proslijedio/la je Tweet
    24. stu 2019.

    New write-up: Command injection is usually mitigated but argument injection is often overlooked. An example of an argument injection chain leading to code execution:

    Poništi
  5. proslijedio/la je Tweet
    12. stu 2019.

    Everyone knows Driver Signature Enforcement.... 🙃 The problem is: Attackers can load any signed driver and abuse its functionality. For example, the process hacker driver can be abused to dump the memory of lsass.exe. Read about it in my blog😋

    Poništi
  6. proslijedio/la je Tweet
    27. ruj 2019.

    Super stoked that , and myself will be sharing some cloud pwnage this year at London with our talk "Reverse Engineering and Exploiting Builds in the Cloud"!

    Poništi
  7. proslijedio/la je Tweet
    Poništi
  8. proslijedio/la je Tweet
    Poništi
  9. proslijedio/la je Tweet
    Poništi
  10. proslijedio/la je Tweet
    21. kol 2019.
    Poništi
  11. proslijedio/la je Tweet
    26. srp 2019.

    Containers in the cloud are fun,breaking out of them is even more fun,I'll be sharing BOtB's new features Arsenal session on Wednesday(7th) and giving a talk version on Saturday (10th),come say hi and chat container pwnage!

    Poništi
  12. proslijedio/la je Tweet
    22. srp 2019.

    Introducing the Office 365 Attack Toolkit, a new blog post and tool release by

    Poništi
  13. proslijedio/la je Tweet
    16. srp 2019.
    command execution in the docker build command
    Poništi
  14. proslijedio/la je Tweet
    11. srp 2019.

    New blog post up! Bypassing a Docker AuthZ plugin and using docker-containerd for privesc.

    Poništi
  15. proslijedio/la je Tweet
    6. lip 2019.

    I have released Fermion, an electron application for with integrated Monaco code editor. Check out the repo here => you can also download a pre-built release package for x64 Windows ❤️💀

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    5. lip 2019.

    Thanks for letting me ramble about "Build to hack, hack to build", that was a lot of fun :) BOtB can be found here ->

    Poništi
  17. proslijedio/la je Tweet
    31. svi 2019.

    A blog post by on his research on the ".sandbox" component, as presented at CanSecWest 2019

    Poništi
  18. proslijedio/la je Tweet
    15. svi 2019.

    Im pleased to announce i will be speaking @ B-Sides London rookie track

    Poništi
  19. proslijedio/la je Tweet
    7. svi 2019.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·