r3b3llion

@r3b3llion_sec

| Penetration Tester | CTF player | Bounty hunter| views are mine alone.

Vrijeme pridruživanja: prosinac 2012.

Tweetovi

Blokirali ste korisnika/cu @r3b3llion_sec

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @r3b3llion_sec

  1. Prikvačeni tweet
    24. sij 2018.

    Done and dusted . Thank you

    Poništi
  2. proslijedio/la je Tweet
    3. velj
    Poništi
  3. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    How to Red Team #1 - A twitter red team mind map Need credentials from the outside? 1. OSINT (Find e-mail/PII) 2. Social Engineer (Trick someone into clicking an e-mail you sent them w/o a payload) 3. Target External Services (Password Spray or find a vulnerable service )

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    11. sij

    My courses are going back to GitHub and off of my website. It was really annoying running them on my website. The reverse engineering course is getting a revamp soon and a basic exploit dev course is being worked on.

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    4. sij

    Attacking Active Directory Federated Services

    Poništi
  8. proslijedio/la je Tweet
    2. sij

    lsassy 1.0.0 is finally out ! 🔸 Remotely dump **with built-in Windows tools only**, procdump is no longer necessary 🔸 Remotely parse lsass dumps to extract credentials 🔸 Link to to detect compromised users with path to Domain Admin

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    25. pro 2019.

    Binary exploitation / reverse engineering course A collection of resources for linux reverse engineering A tool to fastly get all javascript sources/files ,

    Poništi
  10. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  11. proslijedio/la je Tweet
    5. pro 2019.

    Password dumps Collections 1-5's (.txt only): 27.47 B Records (806GB) 296 GB of usernames 260 GB of domain names 250 GB of passwords Unique: 18 GB of usernames (1.296.186.909) 2.3 GB of domain names (67.031.505) 16 GB of passwords (958.883.636)

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    30. stu 2019.

    Here is a recent writeup that I did. It's not as indepth as I want. I'll write a definitive guide for hunting these bugs starting with 0 knowledge when I'm home in a few weeks. I'll also upload all my pocs to github, including recent bugs. I'm pissed. Bye

    Poništi
  13. proslijedio/la je Tweet
    23. stu 2019.

    if you are interested in finding 0-days vulnerabilities from reading codes, here are some articles that I wrote about how I managed to find 0-day RCEs from static code analysis. I hope that will help you all! More to come soon ;)

    Poništi
  14. proslijedio/la je Tweet
    19. stu 2019.

    JWT.Attack.Playbook document the known attacks and potential security vulnerabilities and misconfigurations you may come across when testing JSON Web Tokens, and to provide a repeatable methodology for attacking them.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    18. stu 2019.

    We have open sourced our legal documentation used for physical penetration tests. The purpose is to help the community and organizations protect their employees when conducting testing. Includes three docs: MSA SOW Authorization Letter

    Poništi
  16. proslijedio/la je Tweet
    17. stu 2019.

    Researchers gained access to Lazarus’ APT 1st stage C2 code & details the target validation process. is created via Startup Dir shortcut that calls DLL payload through rundll32. DLL gathers host data used for 2nd stage payload selection.

    Poništi
  17. proslijedio/la je Tweet
    14. stu 2019.

    "When Kirbi walks the Bifrost" In this post, talks about Active Directory attacks leveraging a MacOS AD joined endpoint. Check it out:

    Poništi
  18. proslijedio/la je Tweet
    17. lis 2019.
    Poništi
  19. proslijedio/la je Tweet
    7. lis 2019.

    We Don’t Need PowerShell.exe: Meterpreter Edition! I am keeping playing with the awesome Donut project and this time we are going to spawn a reflective, interactive PowerShell session without relying on powershell.exe! 🐱👤 read the blog post @

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    28. ruj 2019.

    NCC Group releases Sniffle, the world’s first open source sniffer for Bluetooth 5

    Poništi
  21. proslijedio/la je Tweet
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·