My name

@namshub

Use your head...

Vrijeme pridruživanja: listopad 2012.

Tweetovi

Blokirali ste korisnika/cu @namshub

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @namshub

  1. proslijedio/la je Tweet
    prije 23 sata

    Made around $42k from in one month..... Best month so far. A big thanks to for such a great program.

    Poništi
  2. proslijedio/la je Tweet
    prije 10 sati

    Srsly, I don't get why 'default credentials' are still a thing #2020: Cisco IOS XE SD-WAN Software Default Credentials Vulnerability

    Poništi
  3. proslijedio/la je Tweet
    prije 23 sata

    The new version of the arrived! 🔥 Changed file name generation algorithm, process tree, and the path generation algorithm for C2 communication. You won't miss any updates with ANYRUN!

    Poništi
  4. proslijedio/la je Tweet
    5. velj

    nothing left to do now but wait for the parade they will throw me.

    Poništi
  5. proslijedio/la je Tweet
    6. velj

    v1.4.0 has been released with few updates to the function, including dark mode. We will be showing a demo at - the Japan Pavillion #2245 in South Expo. ^YU Tool download: RSA Conference:

    Poništi
  6. proslijedio/la je Tweet
    6. velj

    29 new Open, 48 new Pro (29 + 19). Win32/Emotet, Charming Kitten, Parallax, Various Phish Thanks

    Poništi
  7. proslijedio/la je Tweet
    5. velj
    Poništi
  8. proslijedio/la je Tweet

    Also coming soon: Process Explorer dark mode

    Poništi
  9. proslijedio/la je Tweet
    5. velj

    From CSRF to RCE and WordPress-site (Code Snippets plugin) takeover: CVE-2020-8417

    Poništi
  10. proslijedio/la je Tweet
    4. velj

    ==API TIPS== To welcome the new year, we published a daily tip on API Security & API Pentesting during the month of January 2020. Check out my new article and explore 31 tips + interesting insights about them.

    Poništi
  11. proslijedio/la je Tweet

    A 'technical error' in Google Takeout service accidentally shared private videos (uploaded to Photos) of some users with other accounts. Google admitted the latest mishap yesterday in a security alert sent quietly to affected users.

    Poništi
  12. proslijedio/la je Tweet

    This stack buffer overflow bug (CVE-2019-18634) resides in Sudo versions before 1.8.26 and can be exploited by any local user on affected systems, even without sudo permissions. Check whether 'pwfeedback' is enabled by running: :~$ sudo -l Bug patched in sudo 1.8.31 release.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet

    Yet Another Sudo ! When 'pwfeedback' is enabled, a new Sudo bug could let low privileged & users (or malicious programs) execute arbitrary commands with 'root' privileges. Details for CVE-2019-18634 ➤

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    2. velj

    For all you cryptography nerds out there. I’ve very much enjoyed playing around with this project. GitHub - NationalSecurityAgency/enigma-simulator: An educational demonstration of breaking the Enigma machine

    Poništi
  15. proslijedio/la je Tweet
    3. velj

    Alhamdulillah. Just got my first RCE in 2020 at . Tips: When you can't execute one liner reverse shell on your web shell (because some char was blocked), then try to download those shell to server and execute it via your web shell. style. ماشاءالله

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    2. velj

    Need a Reference Architecture? Check out this one showing how technology enables this strategy/access model. Slide 14 of CISO Workshop Module 3

    Poništi
  17. proslijedio/la je Tweet
    3. velj

    TOP10 last week's threats by uploads ⬇️ 1478 (1738) ⬆️ 463 (380) ⬆️ 233 (184) ⬆️ 119 (97) ⬇️ 104 (118) ⬆️ 102 (97) ⬇️ 96 (132) ⬆️ 76 (33) ⬆️ 74 (60) ⬆️ 70 (60)

    Poništi
  18. proslijedio/la je Tweet

    : We don't need cheat sheets ... We need a methodology. For success, follow or make a methodology instead of blindly using the cheat sheets out there ...

    Poništi
  19. proslijedio/la je Tweet
    3. velj

    Guide on upgrading your SSH keys to Ed25519

    Poništi
  20. proslijedio/la je Tweet
    2. velj

    The video recording is now released. :) It's available in mp4 and webm: I pushed this edition of the slides to a branch:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·