Tweetovi

Blokirali ste korisnika/cu @melqhart

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @melqhart

  1. proslijedio/la je Tweet
    4. velj
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  5. proslijedio/la je Tweet
    1. velj
    Poništi
  6. proslijedio/la je Tweet
    31. sij
    Poništi
  7. proslijedio/la je Tweet
    31. sij
    Poništi
  8. proslijedio/la je Tweet
    31. sij
    Poništi
  9. proslijedio/la je Tweet
    31. sij

    2020-01-30 - Traffic Analysis Exercise: Sol-Lightnet - You get a and a list of alerts - You're asked to write an incident report - Join the fun at: -

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    30. sij

    Iranian hackers target US government workers in new campaign by

    Poništi
  11. proslijedio/la je Tweet
    30. sij

    It should be -2019-1367 rather than -2020-0674, and seems targeting from group.

    Poništi
  12. proslijedio/la je Tweet
    29. sij

    If you are into C++ reverse engineering and never tried OOAnalyzer you are missing out big time!

    Poništi
  13. proslijedio/la je Tweet
    28. sij

    ISC diary: reviews an infection with as the follow-up malware

    Poništi
  14. proslijedio/la je Tweet
    26. sij
    Poništi
  15. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  16. proslijedio/la je Tweet
    26. sij

    Memhunter - Live Hunting Of Code Injection Techniques

    Poništi
  17. proslijedio/la je Tweet
    26. sij
    Poništi
  18. proslijedio/la je Tweet
    24. sij

    Reversing XignCode3 Anticheat - Part 3 is now out! 🥳 Understanding dispatcher functions is fundamental for reversing Windows drivers. Let's see how this Anti-cheat dispatch the IRP requests.

    Poništi
  19. proslijedio/la je Tweet
    24. sij
    Poništi
  20. proslijedio/la je Tweet
    23. sij

    Read the summary of our monthly report on suspected state sponsored activity in November 2019:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·