Mythical Cmd

@mythicalcmd

The great pleasure in life is doing what people say you cannot do, Thats What i do

Internet
Vrijeme pridruživanja: lipanj 2010.

Tweetovi

Blokirali ste korisnika/cu @mythicalcmd

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mythicalcmd

  1. Prikvačeni tweet
    20. lis 2019.
    Odgovor korisniku/ci

    Was late to follow 5.04 was my first. Slackware was the way to go.

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  2. proslijedio/la je Tweet
    Poništi
  3. proslijedio/la je Tweet
    prije 8 sati
    Poništi
  4. prije 57 minuta
    Poništi
  5. proslijedio/la je Tweet
    prije 9 sati

    Python implementation using a slightly modified 3DES algorithm for opening telnet interface on HiSilicon DVR devices with advanced (encrypted) command parser: Co-work with , detailed analysis by him is here:

    Poništi
  6. proslijedio/la je Tweet
    4. velj
    Poništi
  7. prije 59 minuta
    Poništi
  8. prije 1 sat
    Poništi
  9. proslijedio/la je Tweet
    prije 10 sati

    kat's top tips for new coders: - learn how to use git - get a mechanical keyboard - when being offered branded shirts, always get the next size up - color theory takes 1 day to learn and makes your front-end better - when jaywalking, always check for cops first, then cars

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    prije 3 sata

    💻 Register now for the February Wazuh Training and learn the best practices to get the most out of the Wazuh platform components. Limited seats available. 👉 More information:

    Poništi
  11. proslijedio/la je Tweet
    prije 13 sati
    Poništi
  12. proslijedio/la je Tweet
    prije 3 sata

    Pay attention when a malware is using Mailslots (similar to named pipes) for local communication on Windows: Mailslot Server (App. Client): CreateMailslot( ) + ReadFile( ) Mailslot Client (App. Server): CreateFile( ) + WriteFile( )

    Poništi
  13. proslijedio/la je Tweet
    prije 20 sati

    Just out of curiosity, I looked into code of a Chrome extension which is released by a cybersecurity firm. Then I feel like ¯\_(ツ)_/¯.

    Poništi
  14. proslijedio/la je Tweet
    prije 9 sati

    Story of SSRF SSRF to admin access was like this-> 2. Fetching data from internal resources so I tried uri=http://0.0.0.0 , Got default internal page .♥️ Here is exploit uri=http://0.0.0.0/administrator/dashboard. No auth on admin

    Poništi
  15. proslijedio/la je Tweet
    prije 8 sati

    "Internals & Weaknesses of the DPAPI for the Protection of Our Data on Windows" by a great talk, interesting and fun!

    Poništi
  16. proslijedio/la je Tweet

    When you gotta take a leak and the hotel bathroom is locked...

    Poništi
  17. proslijedio/la je Tweet
    prije 9 sati

    Thanks to , possible to have IOC and samples of relative to your tweet ? About IP, this use an downloaded and execute the x64 PE file. C2: 185.193.38.24:443 (TCP)

    Poništi
  18. proslijedio/la je Tweet
    prije 22 sata

    Bug Hunting Tip: Every time you find the word "PROXY" in a URL, ask it for fun stuff.

    Poništi
  19. proslijedio/la je Tweet
    prije 20 sati

    In addition to my previous tweet, this use a one-liner command for execute the xsl extracted from the reconstituted data. This use the interaction method makes it possible to reduce the raising of flags from the traditional shell call.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    3. velj

    Repost of a payload I posted before without any parenthesis after "prompt"! Object.defineProperty(window, 'p', { get: prompt });p; By using a Getter, we invoke the prompt without any input! Ideal for bypassing WAF!

    Poništi
  21. 4. velj
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·