nixbyte

@nixbyte

Pop calc, not alert (1) | APT69

Vrijeme pridruživanja: kolovoz 2015.

Tweetovi

Blokirali ste korisnika/cu @nixbyte

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @nixbyte

  1. proslijedio/la je Tweet
    14. stu 2019.

    Thanks to for releasing their write up on CVE-2019-1405 and CVE-2019-1322. I figured it is time for me to learn some COM stuff so I whip up a PoC. Source: . Video: Thanks to and

    Poništi
  2. 29. lis 2019.

    .NET Core version of 's Donut. Rewrote for dynamic usage with C2 payload generation. Stable in .NET for Linux and Windows. Other cool stuff in store. Possible Nuget package in the futureeeeeezzzzz

    Poništi
  3. proslijedio/la je Tweet
    11. ruj 2019.

    After slacking for the last month, we're back on the job! New changes pushed to Marauder, with the big fixes being: * Release builds no longer spawn a new window * .NET 4.5 compilation actually works (thanks !) More details here:

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    22. srp 2019.

    After 10 days of minimal sleep and thank to for the majority of the work, here we have it - . I've learned so much along the way and I am looking forward to the RCE version.

    Poništi
  5. proslijedio/la je Tweet

    Like y’all ain’t running burp at 500 threads too

    Poništi
  6. proslijedio/la je Tweet
    30. svi 2019.

    There is now a public DOS POC for CVE-2019-0708 (BlueKeep) I just tested it myself here:

    Prikaži ovu nit
    Poništi
  7. 30. svi 2019.

    crash poc for cve-2019-0708 rce coming soon (hopefully lol)

    Poništi
  8. proslijedio/la je Tweet
    13. tra 2019.
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    9. tra 2019.

    Want to use a persistent, hardware based foothold on a red team? Hack into the actual hardware on your processor: Intel AMT & DEATHMETAL: courtesy of

    Poništi
  10. proslijedio/la je Tweet
    6. ožu 2019.

    MOV - Literally Copy Something Instead Of Moving It

    Poništi
  11. proslijedio/la je Tweet
    3. lis 2018.

    A “late” registration in our training. my friend- it’s good to see you (yes- a real pick from our room)

    Poništi
  12. 5. ruj 2018.

    Poništi
  13. proslijedio/la je Tweet

    Roses are red Stack buffers are fixed-size in C nop nop nop nop jmp esp

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    28. srp 2018.

    SQLi to XXE using xmltype() and passing to extractvalue(). id=1'||(select extractvalue(xmltype('<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE root [ <!ENTITY % evil SYSTEM "">%evil;]>'),'/l') from dual)||'

    Poništi
  15. proslijedio/la je Tweet
    17. srp 2018.

    "are you a boy or a girl?" " I'm a hacker." "yes but what's between your legs?" "0days"

    Poništi
  16. proslijedio/la je Tweet
    7. lip 2018.

    New blog is up: Today we are executing Meterpreter on Windows 10 without upsetting Defender. Thanks to

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    13. svi 2018.
    Poništi
  18. proslijedio/la je Tweet
    13. tra 2018.

    if you then you don't don't love me deserve at my me at my

    Poništi
  19. proslijedio/la je Tweet
    20. ožu 2018.

    Fun fact: While SMB1 is the culprit, the introduction of SMB2 indirectly made a better exploit. Srvnet.sys makes the pool grooming easier to perform and much more reliable.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    13. ožu 2018.

    Good news: you no longer need special registry keys to get the Meltdown/Spectre paches for your client Windows machines (). Bad news, now has a special place in your kernel.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·