Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @r3b3llion_sec
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @r3b3llion_sec
-
Prikvačeni tweet
Done and dusted
#oscp. Thank you@offsectrainingHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
Red Teamer's Cookbook: BYOI (Bring Your Own Interpreter) https://www.blackhillsinfosec.com/red-teamers-cookbook-byoi-bring-your-own-interpreter/ … via
@BHInfoSecurity and@byt3bl33d3rHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
#FakeLogonScreen is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with#CobaltStrike's execute-assembly command. https://github.com/bitsadmin/fakelogonscreen …pic.twitter.com/2pAOk9InLMHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
How to Red Team #1 - A twitter red team mind map Need credentials from the outside? 1. OSINT (Find e-mail/PII) 2. Social Engineer (Trick someone into clicking an e-mail you sent them w/o a payload) 3. Target External Services (Password Spray or find a vulnerable service )
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: https://github.com/specterops/at-ps … Enjoy! For information about our current training offerings, information can be found here: https://specterops.io/how-we-help/training-offerings … (4/4)
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.https://github.com/0xZ0F/Z0FCourse_ReverseEngineering …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
Attacking Active Directory Federated Services https://troopers.de/downloads/troopers19/TROOPERS19_AD_AD_FS.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
lsassy 1.0.0 is finally out !
Remotely dump #lsass **with built-in Windows tools only**, procdump is no longer necessary
Remotely parse lsass dumps to extract credentials
Link to #Bloodhound to detect compromised users with path to Domain Admin https://github.com/Hackndo/lsassy pic.twitter.com/vljW7swZGr
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
Binary exploitation / reverse engineering course https://github.com/guyinatuxedo/nightmare … A collection of resources for linux reverse engineering https://github.com/michalmalik/linux-re-101 … A tool to fastly get all javascript sources/files https://github.com/003random/getJS
#bugbounty,#bugbountytipsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
List of Lateral Movement variants in #Windows and#ActiveDirectory by@dottor_morte
(in details
)
[READ]: https://riccardoancarani.github.io/2019-10-04-lateral-movement-megaprimer/ …pic.twitter.com/ZcnS1caRQU
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
Password dumps Collections 1-5's (.txt only): 27.47 B Records (806GB) 296 GB of usernames 260 GB of domain names 250 GB of passwords Unique: 18 GB of usernames (1.296.186.909) 2.3 GB of domain names (67.031.505) 16 GB of passwords (958.883.636) https://github.com/audibleblink/passdb-frontend/raw/master/docs/demo.gif …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
https://sandboxescaper.blogspot.com/2019/10/hunting-for-filesystem-bugs.html … Here is a recent writeup that I did. It's not as indepth as I want. I'll write a definitive guide for hunting these bugs starting with 0 knowledge when I'm home in a few weeks. I'll also upload all my pocs to github, including recent bugs. I'm pissed. Bye
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
if you are interested in finding 0-days vulnerabilities from reading codes, here are some articles that I wrote about how I managed to find 0-day RCEs from static code analysis. https://shells.systems/category/static-code-analysis/ … I hope that will help you all! More to come soon ;)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
JWT.Attack.Playbook document the known attacks and potential security vulnerabilities and misconfigurations you may come across when testing JSON Web Tokens, and to provide a repeatable methodology for attacking them.https://github.com/ticarpi/jwt_tool/wiki …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
We have open sourced our legal documentation used for physical penetration tests. The purpose is to help the community and organizations protect their employees when conducting testing. Includes three docs: MSA SOW Authorization Letter https://github.com/trustedsec/physical-docs …
#TrustedSecHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
Researchers gained access to Lazarus’ APT 1st stage C2 code & details the target validation process.
#Persistence is created via Startup Dir shortcut that calls DLL payload through rundll32. DLL gathers host data used for 2nd stage payload selection. https://blog.telsy.com/lazarus-gate/ pic.twitter.com/rxWMXnouim
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
"When Kirbi walks the Bifrost" In this post,
@its_a_feature_ talks about Active Directory attacks leveraging a MacOS AD joined endpoint. Check it out:https://posts.specterops.io/when-kirbi-walks-the-bifrost-4c727807744f …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
r3b3llion proslijedio/la je Tweet
We Don’t Need PowerShell.exe: Meterpreter Edition! I am keeping playing with the awesome Donut project and this time we are going to spawn a reflective, interactive PowerShell session without relying on powershell.exe!
read the blog post @ https://iwantmore.pizza/posts/meterpreter-psattack.html …pic.twitter.com/MVUs7cSSPc
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
NCC Group releases Sniffle, the world’s first open source sniffer for Bluetooth 5 https://github.com/nccgroup/sniffle …pic.twitter.com/5FwaDLsfoJ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
r3b3llion proslijedio/la je Tweet
Windows Hacking/Red teaming resources https://docs.google.com/document/d/1HYPX0MMn2Qc0TNYRRIaaYU2GIbuTMXHm-JBhRR2vNMU/mobilebasic …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.