Tweetovi

Blokirali ste korisnika/cu @michaelgrube

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @michaelgrube

  1. proslijedio/la je Tweet
    2. velj

    Wanna help VXUG? Here's how.

    Poništi
  2. 24. sij

    You're the WebGL to my browser sandbox You help me escape

    Poništi
  3. proslijedio/la je Tweet
    21. sij

    Reminder A2Y.asm 2020 registration and CFP are open (CFP closes Feb. 29 -- a little over a month from now! Get your submissions in!). Info/reg/CFP at

    Poništi
  4. 20. sij

    If you have CSS+JS skills and want to contribute to the revival of the VX Scene, please get in contact with through DMs. Your help is desperately needed.

    Poništi
  5. 20. sij

    You need to have code running on the machine already obviously, but the interested part about this for me is not needing root in many cases.

    Prikaži ovu nit
    Poništi
  6. 20. sij

    Here's a simple thing I wrote on bypassing Gatekeeper on MacOS using standard OS features. It's not crazy but I think a lot of people believe modifying and hooking signed apps on MacOS is hard. In many cases, it isn't.

    Prikaži ovu nit
    Poništi
  7. 11. sij

    To make your life easier I threw together a script that can demonstrate.

    Prikaži ovu nit
    Poništi
  8. 11. sij

    To successfully boot, just do your evil stuff, fork systemd and exit. PSTree was not showing my evil process, I think because it starts at runlevel 0. Here's some example code:

    Prikaži ovu nit
    Poništi
  9. 11. sij

    Simple grub bootkit: modify grub to boot the OS with your code w/the linux init kernel parameter. Here's sed one-liner to edit target's grub: sed -i.cfg -r -E 's/(root\=UUID\=[a-zA-Z0-9\-]{20,40})/\1 init=\/bootkit/g' /boot/grub/grub.cfg

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    5. sij

    Friends, I advise you check out 's Senshi.B. -parasitic direct action infector of PE exe -new EPO for AMD64 files, hooks the CFG function -last section appender -CRCs instead of API names and more. Its a work of art. 1luv -smelly__vx

    Poništi
  11. 30. pro 2019.

    It's about a week and a half away but I'm looking forward to the next malware development meetup. If you live in the Ann Arbor area, come check it out! I'll walk through something I've been working on and we'll have some resources for getting started

    Poništi
  12. proslijedio/la je Tweet
    23. pro 2019.

    Friends, We've added a new paper: 'Common Language Runtime Hook for Persistence' by It is a thoroughly written paper for both 'stage 0 malware' and .NET internals.

    Poništi
  13. 23. pro 2019.

    It VMProtecc It attacc but most importantly It unpacc

    Poništi
  14. 19. pro 2019.

    This bug lets you start arbitrary containers on the target machine. Potentially useful for pivoting on the network or just mining ;)

    Prikaži ovu nit
    Poništi
  15. 19. pro 2019.

    Here's a POC and a very brief description for my Eclipse Che RCE Vuln

    Prikaži ovu nit
    Poništi
  16. 18. pro 2019.

    Really cool. Tested, working for me. Props to the author

    Poništi
  17. 17. pro 2019.

    My cross-platform bot finally has encrypted config, p2p command and control through RSA signed commands by the botmaster and restricted-route topology to make mapping the network much harder. Still have a long way to go, but making progress. Feels good.

    Poništi
  18. 2. pro 2019.

    The only responsible way to disclose is to give your PoC to threat actors 90 days before disclosure.

    Poništi
  19. 21. stu 2019.

    Full tutorial available here. Note that for python3 you must import fcp3, not fcp

    Prikaži ovu nit
    Poništi
  20. 21. stu 2019.

    Write applications that have private, decentralized backends on Freenet in python

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·