Jon

@notCh3rn0byl

I like computers. Computers are cool, I got two

Vrijeme pridruživanja: kolovoz 2019.

Tweetovi

Blokirali ste korisnika/cu @notCh3rn0byl

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @notCh3rn0byl

  1. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  2. proslijedio/la je Tweet
    prije 13 sati

    Root cause analysis and exploit for a Windows kernel ws2ifsl.sys use-after-free vulnerability.

    Poništi
  3. proslijedio/la je Tweet

    Small POC in powershell exploiting hardlinks during the VM deletion process

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    Wanna help VXUG? Here's how.

    Poništi
  5. proslijedio/la je Tweet
    1. velj

    This never gets old, so I'll never stop periodically sharing it.

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    My coworker just shared the best thing: Oh Shit, Git!?!

    Poništi
  7. proslijedio/la je Tweet

    🎉 New blogpost :) Quick blogpost about how I found a OOM/DoS bug in a famous / package using coverage-guided fuzzer. ➡️ Fuzzer: Jsfuzz by ➡️ Target: wasm-parser ➡️ Bug: DoS/OOM

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    New content has been added. -Discord Spidey Bot malware source code leak -Mocoh Poly engine by -Advanced Metamorphic Techniques in Computer Viruses 1luv

    Poništi
  9. proslijedio/la je Tweet
    29. sij

    Bob Rossing a fucktup Apple

    Poništi
  10. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    28. sij

    I wrote about AV as attack surface roughly 7 years ago. I analyzed compiler mitigations 8 years ago and found them lacking.

    Poništi
  12. proslijedio/la je Tweet
    27. sij

    PoC for CVE-2019-1125 (SWAPGS attack)

    Poništi
  13. proslijedio/la je Tweet
    28. sij

    Friends, -Virus Bulletin Archive 1997 - 2001 is now live: -A gentlemen reached out, hes aiding us in our malware sample workload, allowing us to parse 40k samples/day -A company was kind enough to offer aid, we may be able to parse even MORE samples!

    Poništi
  14. proslijedio/la je Tweet
    27. sij
    Odgovor korisniku/ci

    You don't make his lunch?

    Poništi
  15. proslijedio/la je Tweet
    27. sij

    Interested in learning Windows Kernel exploitation ? wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.

    Poništi
  16. proslijedio/la je Tweet
    27. sij

    Whatever you do don't run the PS/NtObjectManager command '[NtApiDotNet.CreateUserProcess]::Fork("IgnoreSectionObject", 0)' on Windows 10 1909. I did and I was very sad, so just don't!

    Poništi
  17. proslijedio/la je Tweet
    27. sij

    Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption

    Poništi
  18. proslijedio/la je Tweet
    27. sij

    we have an update to DTrace on Windows. with the latest 20H1 insider build, no more KD required to use dtrace on windows. plus arm64 MSI.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  20. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·