netbiosX

@netbiosX

Red Teamer & Blogger Tweets are my own and not the views of my employer

Internet
Vrijeme pridruživanja: siječanj 2012.

Tweetovi

Blokirali ste korisnika/cu @netbiosX

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @netbiosX

  1. prije 1 sat

    PolyShell - a script that's simultaneously valid in Bash, Windows Batch, and PowerShell

    Poništi
  2. 4. velj
    Poništi
  3. proslijedio/la je Tweet
    3. velj

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    A suite of tools for threat hunters to collect data from many endpoints in a network and automatically enrich the data

    Poništi
  5. proslijedio/la je Tweet
    3. velj

    📢 New video is up on our YouTube channel! Usage of "Waitfor" binary as a method to download and execute malware! Don't forget to subscribe to our channel to receive notifications 🔔 of our new videos🎞️

    Poništi
  6. proslijedio/la je Tweet
    3. velj
    Poništi
  7. 3. velj

    FakeLogonScreen - A utility to fake the Windows logon screen in order to obtain the user's password. The password entered is validated against the Active Directory or local machine to make sure it is correct and is then saved to disk.

    Poništi
  8. 2. velj

    kerbrute - An script to perform kerberos bruteforcing by using impacket

    Poništi
  9. proslijedio/la je Tweet
    2. velj

    Happy to say that I'll present at with my colleague about how threat hunting processes and tools can be leveraged in offensive operations. This is the second in a series of talks on how to use blue team techniques in red team ops

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    2. velj

    📢 New video 🎞️is up in our Instagram account showing how "waitfor" binary can be used to execute arbitrary code. 📽️🖥️💡

    Poništi
  11. 31. sij

    Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS -

    Poništi
  12. 31. sij

    ScatterBrain Suite - Suite of Running Utilities

    Poništi
  13. 31. sij

    MoveKit - Cobalt Strike lateral movement kit

    Poništi
  14. proslijedio/la je Tweet
    30. sij

    📢 Follow our Instagram account for the latest red teaming videos and stories 📸🔒

    Poništi
  15. proslijedio/la je Tweet
    29. sij

    📢 Our YouTube channel is now active. If you want to receive early notifications🔔of our videos 🎞️ please subscribe! 📽️

    Poništi
  16. 29. sij

    Talks and trainings look great one more time! If you are in Europe and want to attend a world class conference then is the only choice!

    Poništi
  17. 29. sij
    Poništi
  18. proslijedio/la je Tweet
    28. sij

    Capture credentials sprayed across the network by various IT and security products

    Poništi
  19. proslijedio/la je Tweet
    27. sij
    Poništi
  20. proslijedio/la je Tweet
    27. sij

    Smart collection of common IOC types

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·