Tweetovi

Blokirali ste korisnika/cu @myassemblue

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @myassemblue

  1. proslijedio/la je Tweet
    2. velj

    kerbrute - An script to perform kerberos bruteforcing by using impacket

    Poništi
  2. proslijedio/la je Tweet
    30. sij
    Poništi
  3. proslijedio/la je Tweet
    30. sij

    On successful compromise of the user endpoint, the red team deployed their ultimate weapon

    Poništi
  4. proslijedio/la je Tweet
    25. sij
    Poništi
  5. proslijedio/la je Tweet
    25. sij
    Poništi
  6. proslijedio/la je Tweet
    28. sij

    From the folks that brought you Atomic Red Team, Chain Reactor is a new open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.

    Poništi
  7. proslijedio/la je Tweet
    27. sij

    Can't wait to present the progress we've made since at ! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer.

    Poništi
  8. proslijedio/la je Tweet
    24. sij

    Some scripts useful for red team activities : cc

    Poništi
  9. proslijedio/la je Tweet
    24. sij

    Cross-Site Websocket Hijacking bug in Facebook that leads to account takeover By Bounty: $12500

    Poništi
  10. proslijedio/la je Tweet
    Poništi
  11. proslijedio/la je Tweet
    24. sij

    HTTP Request Smuggler now supports overriding the request method! spotted that using an alternative method like DELETE can sometimes let you exploit otherwise-secure targets. (If you accidentally delete someone's homepage, that's on your head!)

    Poništi
  12. proslijedio/la je Tweet
    24. sij

    Post-exploitation tip: Do you know how to trivially & remotely hijack an session without prompt nor warning on user's side using signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details:

    Poništi
  13. proslijedio/la je Tweet
    23. sij

    r2frida 4.2 is out! You can now use breakpoints and eternalize scripts in ! /cc

    Poništi
  14. proslijedio/la je Tweet
    23. sij

    Video of webcast on the training module for Pass-The-Ticket is out

    Poništi
  15. proslijedio/la je Tweet
    23. sij
    Poništi
  16. 22. sij

    Hackers don't give a shit if u're {$_.somebullshit} Compliance.

    Poništi
  17. proslijedio/la je Tweet
    22. sij
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    21. sij

    List-RDP-Connections-History. list the RDP Connections History of logged-in users or all users

    Poništi
  19. proslijedio/la je Tweet
    22. sij
    Poništi
  20. proslijedio/la je Tweet
    20. sij

    First blog post: Unauthorized Google Maps API Key Usage Cases, and Why You Need to Care

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·