Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @n00py1
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @n00py1
-
Prikvačeni tweet
List of tools I've been collecting since I started pen-testing. Curated and organized. https://raw.githubusercontent.com/n00py/ReadingList/master/gunsafe.txt …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I’ve thought about buying a proper mitt, but I honeslty find this crocodile too funny to switch out.pic.twitter.com/UzrjjFuOLF
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I had some fun exploiting LDAP this week. I'm far from an LDAP expert, so please, bear with me as I try to make some sense of how I went to went from what seemed to be near complete lockdown to owning the domain.https://www.n00py.io/2020/02/exploiting-ldap-server-null-bind/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)https://www.blackhillsinfosec.com/red-teamers-cookbook-byoi-bring-your-own-interpreter/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 Often AVs rely on simple signatures to detect malicious software and I needed a tool in order to confirm this behavior and be able to produce a working bypass. That’s why I wrote x0rro. https://iwantmore.pizza/posts/x0rro.html …pic.twitter.com/tqNVylQiNk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
We are announcing our new blog with a post about Teamviewer and storing user passwords encrypted and not hashed allow for easy plaintext retrieval from the Windows registry.https://whynotsecurity.com/blog/teamviewer/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
If you study maldocs you know the Shell() function. Did you know about Interaction$.Shell@()? This malware does:
https://www.virustotal.com/gui/file/8817300ae48966451e4090eb88225e70f083010f2f89b29854bdb78a5b7b0425 …
Interesting to see how just calling Interaction$.Shell drops the detection rate:
https://www.virustotal.com/gui/file/20eac82e2b7149190d868e26abcc244979a0ec478bc306e1cf071cbff572d0f7/detection …
https://www.virustotal.com/gui/file/95c000ae085c4c227ea4812f101ffd0c3b062a8347566787bd95839835a159aa/detection …pic.twitter.com/dEG9jJwGqL
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
For those of you who work from home with (fussy) children. How do you work without going insane? Headphones? Coffee shop?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :) https://netsec.expert/2020/02/01/xss-in-2020.html …
#bugbountytipspic.twitter.com/Mdygq1PI9Z
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
I'm social engineered in real time on this!

Thanks for coming on @TinkerSec!!#hackers#socialengineeringhttps://twitter.com/coalfirelabs/status/1223306794304331777 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Imagine if your entire product offering amounted to a bash one-liner piping curl to grep. https://twitter.com/TinkerSec/status/1223585595957694464 …
Tweet je nedostupan.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
Want to see how the
@Mandiant red team weaponizes@FireEye threat intel for R&D and TTP development? Check out some research I did with@evan_pena2003 and@FuzzySec. Also includes some new executables that can be used for DLL abuse.https://www.fireeye.com/blog/threat-research/2020/01/abusing-dll-misconfigurations.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I never reboot my VMs, but when I do it’s because the clipboard stopped working.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
Red Teaming with Covenant and Donuthttps://blog.naijasecforce.com/red-teaming-with-covenant-and-donut/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools https://morph3sec.com/2019/07/16/Windows-Red-Team-Cheat-Sheet/ …pic.twitter.com/oDXKA2bN4b
Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
New tool to play with
For those who may not be aware, there is a new Nessus licence called Nessus Essentials, which is a free copy of Nessus! https://www.tenable.com/products/nessus/nessus-essentials …pic.twitter.com/mFRUoVYn3Z
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
Windows Defender got you feeling down? Here is a simple trick to load your meterpreter payloads past Windows Defender https://hacker.house/lab/windows-defender-bypassing-for-meterpreter/ …pic.twitter.com/dxBieW2ZQv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZurehttps://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
Just pushed a somewhat big update to SILENTTRINITY with a lot of forward compatibility fixes for Python 3.8 and made the PowerShell "stageless" stager public. Plus more modules and bug fixeshttps://github.com/byt3bl33d3r/SILENTTRINITY …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
n00py proslijedio/la je Tweet
2019 may have been year of the C2, but according to the Chinese New Year calendar, 2020 is the year of the RAT


Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.