Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @mohammadaskar2
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mohammadaskar2
-
Prikvačeni tweet
Just wrote an article about
#Octopus, the tool that I presented at@BlackHatEvents BlackHat London Arsenal 2019 https://shells.systems/unveiling-octopus-the-pre-operation-c2-for-red-teamers/ … I wish you will like the tool and stay tuned for more updates soon! Also I want to thank@ToolsWatch for the great opportunity!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Askar proslijedio/la je Tweet
Playing around with Octopus C2 from
@mohammadaskar2 Greak work Askar!pic.twitter.com/7BFO33vOxA
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Was working on a new update for Octopus with
@Bb_hacks to deploy Cobalt Strike Beacon directly via Octopus agent, need more extra work to guarantee the stability and to make it more stealthy. I will push this update with the stable version soon! https://github.com/mhaskar/Octopus pic.twitter.com/jtBod3v2la
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Askar proslijedio/la je Tweet
Win 10 search blank? Fix : [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Search] "CortanaConsent"=dword:00000000 "BingSearchEnabled"=dword:00000000
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Askar proslijedio/la je Tweet
x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 Often AVs rely on simple signatures to detect malicious software and I needed a tool in order to confirm this behavior and be able to produce a working bypass. That’s why I wrote x0rro. https://iwantmore.pizza/posts/x0rro.html …pic.twitter.com/tqNVylQiNk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just discovered a new 0-day RCE in a well known network monitoring software, the code is well written which took me sometime to find the vulnerability. you can exploit it without authentication under some conditions. stay tuned for the full exploit code and a detailed article!pic.twitter.com/q7gQW1HUIr
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Askar proslijedio/la je Tweet
The ultimate test of your knowledge is your capacity to convey it to another.pic.twitter.com/nV4YQdn5ZU
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Askar proslijedio/la je Tweet
Call for papers is open now until 1st March 2020. Please submit your talk's abstract to info@bsidesamman.org You can find the topics in the following link: https://www.bsidesamman.org/cfp
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Askar proslijedio/la je Tweet
Why is this so hard to understand? It’s not a 0day, the bug was disclosed in 2018 ffs https://bugs.php.net/bug.php?id=76047 …https://twitter.com/campuscodi/status/1223100593218183168 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Askar proslijedio/la je Tweet
Kali 2020.1 is up for download! Big changes yet again, with non-root user by default, a single installer image for multiple desktop enviroments, updates to themes, and more! Not to mention Rootless NetHunter! https://www.kali.org/releases/kali-linux-2020-1-release/ …pic.twitter.com/TkyPisbEQu
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spent the whole day trying to find RCE in a well known monitoring software, finished with couple of medium issues and a headache, but overall I had a lot of fun. Will back to it soon!pic.twitter.com/ORGeOYwcvo
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Askar proslijedio/la je Tweet
Revisiting RDP lateral movement https://posts.specterops.io/revisiting-remote-desktop-lateral-movement-8fb905cb46c3 … and releasing a project that will be part of a bigger tool coming next week
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Askar proslijedio/la je Tweet
Just dropped a new feature to
#Octopus, you can now generate#Digispark payloads and perform HID attack to drop Octopus agent on windows machines https://github.com/mhaskar/Octopus You can know more about Octopus from this article https://shells.systems/unveiling-octopus-the-pre-operation-c2-for-red-teamers/ … stable version will be out soon!pic.twitter.com/W52VLbVCpU
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just dropped a new feature to
#Octopus, you can now generate#Digispark payloads and perform HID attack to drop Octopus agent on windows machines https://github.com/mhaskar/Octopus You can know more about Octopus from this article https://shells.systems/unveiling-octopus-the-pre-operation-c2-for-red-teamers/ … stable version will be out soon!pic.twitter.com/W52VLbVCpU
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Askar proslijedio/la je Tweet
Confirmed!
@steventseeley and@mufinnnnnnn used an info leak and a desierialization bug to get code execution w/ continuation on the Inductive Automation Ignition. They earn themselves $25,000 and 25 points towards Master of Pwn.#P2OMiami#S4x20pic.twitter.com/XK4kAwXXyj
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Askar proslijedio/la je Tweet
I just realized Desharialize, a tool to easily and dynamically exploit CVE-2019-0604 (SharePoint CVE). The reason to make it: - Use your own command (Public POCs contain hardcoded webshell commands - not clean for legit pentesting, or requires dotnet)https://github.com/Voulnet/desharialize …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I just tried BadBlood by
@davidprowe to generate random users, groups ,computers and set permissions too, it's a great choice if you want to fill your domain. Thanks David for the great tool.pic.twitter.com/wTFjq5nTNJ
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Askar proslijedio/la je Tweet
Solved already since Pandora FMS 7.0NG 742 update
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Askar proslijedio/la je Tweet
Ethical Hacking Lessons — Building Free Active Directory Lab in Azure
#infosec#pentesthttps://medium.com/@kamran.bilgrami/ethical-hacking-lessons-building-free-active-directory-lab-in-azure-6c67a7eddd7f …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.