Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @malwarehedgehog
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @malwarehedgehog
-
Security Pepe proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Security Pepe proslijedio/la je Tweet
Very useful tool if you are studying Drivers. https://github.com/zodiacon/DriverMon … Also really enjoyed the book: Windows Kernel Programming https://leanpub.com/windowskernelprogramming …
@zodiaconHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 Often AVs rely on simple signatures to detect malicious software and I needed a tool in order to confirm this behavior and be able to produce a working bypass. That’s why I wrote x0rro. https://iwantmore.pizza/posts/x0rro.html …pic.twitter.com/tqNVylQiNk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
Introduction to mobile network intrusion from a mobile phone: https://medium.com/mobile-stacks-and-networks-security/introduction-to-mobile-network-intrusions-from-a-mobile-phone-9a8e909cc276 … by
@Gallium24,@BuuriMa, Henri,@tmakkonen,@ad_ili_rai_en and myself.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
Full writeup and exploit of Windows kernel ws2ifsl use-after-free (CVE-2019-1215) via
@bluefrostsec and@flxflndy https://labs.bluefrostsecurity.de/blog/2020/01/07/cve-2019-1215-analysis-of-a-use-after-free-in-ws2ifsl/ …pic.twitter.com/XvilzbqrOp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
Did you enjoy our
#REvil /#Sodinokibi string decryption tutorial ... But you wish we had used#Ghidra instead of#IDAPro
Check out this awesome tutorial from @larsborn
https://blag.nullteilerfrei.de/2020/02/02/defeating-sodinokibi-revil-string-obfuscation-in-ghidra/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
New video is up on our YouTube channel! Usage of "Waitfor" binary as a method to download and execute malware! Don't forget to subscribe to our channel to receive notifications
of our new videos
https://www.youtube.com/watch?v=yzRQhutZpg4 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't.
@aionescu and I wrote about these! https://windows-internals.com/dkom-now-with-symbolic-links/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)https://www.blackhillsinfosec.com/red-teamers-cookbook-byoi-bring-your-own-interpreter/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
VB6 Packers are no joke, This one took me a while to write and I do hope you enjoy it! Analyzing Modern Malware Techniques - Part 3 Vb6 packershttps://0x00sec.org/t/analyzing-modern-malware-techniques-part-3/18943 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
Finally released part 2 of my »Reversing
#WannaCry with#Ghidra« series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.https://www.youtube.com/watch?v=Q90uZS3taG0 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
[COM hijacking] While I was looking for some methods related to the COM hijacking technique, I found a new method that allows you to hijack COM and execute Scriptlet instructions :) Registry import file: https://gist.github.com/homjxi0e/caa276ba43b17bb9cb9867b40b774e17 …pic.twitter.com/o8oX1mSypF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
1\ Malware sandboxes are useful but extremely limited. Here's a malware call graph, and in red are the functions the malware actually *executed* when run in a sandbox -- a miniscule fraction of the malware's potential badness!pic.twitter.com/Ba5EK5EeIO
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore, https://github.com/hfiref0x/KDU pic.twitter.com/s154qYlIKR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
SettingSyncHost.exe as a LolBin http://www.hexacorn.com/blog/2020/02/02/settingsynchost-exe-as-a-lolbin/ …
#LOLBIN cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foopic.twitter.com/dOM4EHq4ZuHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers https://wrongbaud.github.io/stm-xbox-jtag/ Hope you enjoy! As always ping me with any questions
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
#FakeLogonScreen is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with#CobaltStrike's execute-assembly command. https://github.com/bitsadmin/fakelogonscreen …pic.twitter.com/2pAOk9InLMHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
"Dark sides of Java remote protocols" by
@_tint0https://youtu.be/tj6MdgfjQTUHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
Security of Azure DevOps build agents demystified by
@Julien_Legras https://www.synacktiv.com/posts/pentest/azure-devops-build-agent-analysis.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Security Pepe proslijedio/la je Tweet
Want to see how the
@Mandiant red team weaponizes@FireEye threat intel for R&D and TTP development? Check out some research I did with@evan_pena2003 and@FuzzySec. Also includes some new executables that can be used for DLL abuse.https://www.fireeye.com/blog/threat-research/2020/01/abusing-dll-misconfigurations.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.