Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @melqhart
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @melqhart
-
melqhart proslijedio/la je Tweet
If you study maldocs you know the Shell() function. Did you know about Interaction$.Shell@()? This malware does:
https://www.virustotal.com/gui/file/8817300ae48966451e4090eb88225e70f083010f2f89b29854bdb78a5b7b0425 …
Interesting to see how just calling Interaction$.Shell drops the detection rate:
https://www.virustotal.com/gui/file/20eac82e2b7149190d868e26abcc244979a0ec478bc306e1cf071cbff572d0f7/detection …
https://www.virustotal.com/gui/file/95c000ae085c4c227ea4812f101ffd0c3b062a8347566787bd95839835a159aa/detection …pic.twitter.com/dEG9jJwGqL
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oathttp://www.kitploit.com/2020/02/gda-android-reversing-tool-new.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore, https://github.com/hfiref0x/KDU pic.twitter.com/s154qYlIKR
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't.
@aionescu and I wrote about these! https://windows-internals.com/dkom-now-with-symbolic-links/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
melqhart proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
melqhart proslijedio/la je Tweet
Some of the bugs in VirtualBox found by
@4nhdaden There are more to come. CVE-2019-2984 - https://starlabs.sg/advisories/19-2984/ … CVE-2019-3002 - https://starlabs.sg/advisories/19-3002/ … CVE-2019-3005 - https://starlabs.sg/advisories/19-3005/ … CVE-2019-3026 - https://starlabs.sg/advisories/19-3026/ … CVE-2019-3031 - https://starlabs.sg/advisories/19-3031/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
Reversing C++ executables with OOAnalyzer Ghidra Plugin https://insights.sei.cmu.edu/sei_blog/2019/07/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra.html …pic.twitter.com/rK2k4Q17Gd
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
2020-01-30 - Traffic Analysis Exercise: Sol-Lightnet - You get a
#pcap and a list of alerts - You're asked to write an incident report - Join the fun at: https://malware-traffic-analysis.net/2020/01/30/index.html … -#TrafficAnalysisExercisepic.twitter.com/cxVFZvOqvK
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
Iranian hackers target US government workers in new campaign https://zd.net/316y82g by
@campuscodiHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
It should be
#CVE-2019-1367 rather than#CVE-2020-0674, and seems targeting#China from#Darkhotel#APT group.https://twitter.com/pjcampbe11/status/1222556092242317315 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
If you are into C++ reverse engineering and never tried OOAnalyzer you are missing out big time! https://insights.sei.cmu.edu/sei_blog/2019/07/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
ISC diary:
@malware_traffic reviews an#Emotet infection with#Trickbot as the follow-up malware https://i5c.us/38JnAsz pic.twitter.com/68ZJkCX2WE
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
I uploaded 2 new samples (doc+exe) of the new
#emotet malware. Password:infected. Links on@virusbay_io: https://beta.virusbay.io/sample/browse/d51ca9ca5d193aa507c6fd83eda9888b … https://beta.virusbay.io/sample/browse/547e49c2b4a9252a7fd79f02e51eb15d … https://beta.virusbay.io/sample/browse/10ee50867aaa64a076653bad1b08a0dd … https://beta.virusbay.io/sample/browse/a0bd308a989babd5c4e72cf6f7320d11 …#Hacking#botnet#Malware#DFIR#CyberSecurity#RansomwareHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
Some study notes on LSASS hooking for harvesting interactive logon credentials. https://ired.team/offensive-security/credential-access-and-credential-dumping/intercepting-logon-credentials-by-hooking-msv1_0-spacceptcredentials … Thanks to
@_xpn_ for his inspiring posts about mimikatz.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
Memhunter - Live Hunting Of Code Injection Techniqueshttp://www.kitploit.com/2020/01/memhunter-live-hunting-of-code.html …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
Multiple Ways to Persistence on Windows 10 with Metasploithttps://www.hackingarticles.in/multiple-ways-to-persistence-on-windows-10-with-metasploit/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
Reversing XignCode3 Anticheat - Part 3 is now out!
Understanding dispatcher functions is fundamental for reversing Windows drivers. Let's see how this Anti-cheat dispatch the IRP requests.
https://niemand.com.ar/2020/01/24/reversing-xigncode3-driver-part-3-analyzing-dispatch-functions/ …
#reversing#hacking#security#infosecpic.twitter.com/LUDWutF7pI
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
A collection of UNIX hacking tips & tricks :https://github.com/hackerschoice/thc-1001-tips-and-tricks/blob/master/README.md …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
melqhart proslijedio/la je Tweet
Read the summary of our monthly
#threatintel report on suspected state sponsored activity in November 2019:https://threatrecon.nshc.net/2020/01/23/november-2019-intelligence-report/ …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.