\𝚡𝚛𝟺\𝚡𝟹𝚍

@r4_3d

𝚔𝚎𝚎𝚙 𝚊𝚒𝚖𝚒𝚗𝚐 𝚑𝚒𝚐𝚑𝚎𝚛, 𝚝𝚑𝚎 𝚜𝚔𝚢 𝚒𝚜 𝚕𝚒𝚖𝚒𝚝.

Kingdom of Saudi Arabia
Vrijeme pridruživanja: studeni 2012.

Tweetovi

Blokirali ste korisnika/cu @r4_3d

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @r4_3d

  1. 1. stu 2019.

    (Kuiper) is a digital collaboration investigation platform helps digital investigators to parse, search, visualize evidences and coordinate their efforts to produce high quality results in an efficient way,Thank you and your team

    Poništi
  2. proslijedio/la je Tweet
    1. stu 2019.

    تم بحمد الله برمجة كايبر الذي يهدف الى مساعد التحليل الجنائي الالكتروني. من اهم مزاياه مساعدة المحللين على تحليل الأدلة الرقمية المتعلقة بنظام التشغيل ويندوز بالتركيز على الاداء و العمل الجماعي وايضا التنبيهات وهناك المزيد ..

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    1. stu 2019.

    Pleased to announce that we have published Kuiper a digital investigation platform. It is designed to aid investigators in the analysis of a wide range of windows artifacts with an emphasis on performance, collaboration and alerting.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    23. srp 2019.
    Poništi
  5. proslijedio/la je Tweet
    2. srp 2019.

    When you know they got 4 EDRs but you phish anyways

    Poništi
  6. proslijedio/la je Tweet
    12. lip 2019.

    UAC bypass via Event Logs works via Sysmon DNS logs too same as with other events

    Poništi
  7. proslijedio/la je Tweet
    3. lip 2019.

    How Red Teams Bypass AMSI and WLDP for .NET Dynamic Code

    Poništi
  8. proslijedio/la je Tweet
    2. lip 2019.

    Interesting finding about ; bypassing standard ruleset by leveraging alternate data streams - . tl;dr add deny rules to C:\Windows\System32\AppLocker\

    Poništi
  9. proslijedio/la je Tweet

    Am I the first person to pop a shell in notepad? 🤣 ....believe it or not, It's a real bug! 🐞

    Poništi
  10. proslijedio/la je Tweet
    26. svi 2019.
    Poništi
  11. proslijedio/la je Tweet
    16. svi 2019.

    DHCP security in Windows 10: analyzing critical vulnerability CVE-2019-0726

    Poništi
  12. proslijedio/la je Tweet
    14. svi 2019.

    WhatsApp reimplemented a complex protocol from Java to C++ and didn't put in the proper buffer size checks. Checkpoint Analysis:

    Poništi
  13. proslijedio/la je Tweet
    14. svi 2019.

    MDS attacks include: -Zombieload - Fallout - RIDL - Store-to-Leak Forwarding exploits - and a new flaw that makes Meltdown exploitable again More on these MDS attacks here:

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet

    As a red teamer, what is your first thought after getting your initial foothold on a system?

    Poništi
  15. proslijedio/la je Tweet
    29. tra 2019.

    100 random bug bounty kids vs. 3 professional pentesters (jk jk)

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    27. tra 2019.

    Modern Binary Exploitation-CSCI 4968 - Spring '15

    Poništi
  17. proslijedio/la je Tweet
    24. tra 2019.
    Poništi
  18. proslijedio/la je Tweet

    A demonstration of a new class of DNS cache poisoning attacks(will be presented in INFOCOM19)where the target is the client device directly (not the resolver) فيديو توضيحي للاختراق والذي سوف أعرض تفاصيله في انفوكوم 1 مايو ان شاءالله

    Poništi
  19. proslijedio/la je Tweet
    20. tra 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·