Tweetovi

Blokirali ste korisnika/cu @mk82js

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mk82js

  1. proslijedio/la je Tweet
    28. sij

    Check out ' tips on Fuzzing, to overcome known challenges and maximize results:

    Poništi
  2. proslijedio/la je Tweet
    28. sij

    tip: use logman.exe with -b, -rf, -s, and -rc to create highly-privileged local, and remote scheduled tasks. They are deeply hidden in the Task Scheduler GUI, especially as the actions are masked under "Custom Handler". And no one looks for attackers in Perfmon/DCS.

    Poništi
  3. proslijedio/la je Tweet
    29. sij

    Finding and exploiting CVE-2018–7445 (unauthenticated RCE in MikroTik’s RouterOS SMB)

    Poništi
  4. proslijedio/la je Tweet

    PoC script that shows RCE vulnerability over Intellian Satellite controller

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    ICYMI - released MoveKit and StayKit, a collection of aggressor scripts, .NET projects, and templates to enhance lateral movement and persistence on your engagements. Link: MoveKit: StayKit:

    Poništi
  6. 26. sij
    Poništi
  7. proslijedio/la je Tweet
    18. sij

    Just finished writing my second windows kernel Practical Reverse Engineering solution: "Dumping DPC Queues: Adventures in HIGH_LEVEL IRQL" 🥳 Writing signatures for undocumented windows kernel stuff in HIGH_LEVEL IRQL sure is fun (BSODs are also fun)😎

    Poništi
  8. proslijedio/la je Tweet
    18. sij

    some good notes on translating x86 assembly to x86-64:

    Poništi
  9. proslijedio/la je Tweet
    17. sij

    My blog post about CVE-2020-0601 is online! I hope you guys enjoy it, I didn't sleep for 2 days now, pardon me if I made some mistakes :) Feel free to point out any mistakes!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi
  11. proslijedio/la je Tweet
    18. sij

    Windows kernel explorer: A free powerful Windows kernel research tool

    Poništi
  12. proslijedio/la je Tweet
    18. sij

    New blog post: cuck00 A XNU/IOKit info leak 1day killed in iOS 13.3.1 beta 2.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    16. sij
    Poništi
  14. proslijedio/la je Tweet
    16. sij

    Dropped a new Burp extension yesterday: searches params for common targets (similar to HUNT ext), searches responses for secrets (like Secret Finder ext), searches responses for specific keywords that indicate vulnerability - all in Java.

    Poništi
  15. proslijedio/la je Tweet
    15. sij

    【Weblogic New Unserialization RCE】 CVE-2020-2546 T3 RCE CVE-2020-2551 IIOP RCE 攻击者通过IIOP协议远程访问Weblogic 上的远程接口,默认启用,传入恶意数据,从而获取服务器权限并在未授权情况下远程执行任意代码。

    Poništi
  16. proslijedio/la je Tweet
    14. sij

    Attacking SSL VPN Part 1: PreAuth RCE on Palo Alto GlobalProtect Part 2: Breaking the Fortigate SSL VPN Part 3: The Golden Pulse Secure SSL VPN RCE Chain - great work by &&

    Poništi
  17. proslijedio/la je Tweet
    12. sij

    Next-gen BurpSuite penetration testing tool. #227 (2018)

    Poništi
  18. proslijedio/la je Tweet
    6. sij

    My first blog post! Bypassing AV via in-memory PE execution. I've created a tool to go along with the post and help automate creating undetected PEs, links inside the post 😉

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    4. sij
    Poništi
  20. proslijedio/la je Tweet
    4. sij

    ShellGen: Dynamic and extensible shell code generator

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·