LeCerveau

@rachidharrando

Office of the CISO . partner. dude. Blackhat Arsenal review Board. Don't you see that the glass is half full?

The Cloud
Vrijeme pridruživanja: lipanj 2009.

Tweetovi

Blokirali ste korisnika/cu @rachidharrando

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @rachidharrando

  1. proslijedio/la je Tweet

    CVE In The Hook – Monthly Vulnerability Review (January 2020 Issue). Covered CVE-2020-7247, CVE-2019-19781, CVE-2020-0601, CVE-2020-0609 and more.

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Come to Arsenal and see how this Personal Security Assistant tool aims to help facilitate and enhance proper communication for all stakeholders, increased efficiency and effectiveness, and 24 hours availability

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    AttackSurfaceMapper v2.0 encompasses multiple tools for performing reconnaissance and extracting intel. New features have been added, including Active Port Scanning and “SuperFast” mode. See & demo it at

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    Check out Android Application Vulnerability Hunting System ‘SAST’ at Arsenal on April 2 to learn about its highly customizable features for supporting apk analysis and vulnerability scanning w/ , &

    Poništi
  5. proslijedio/la je Tweet
    28. sij

    See how this tool is able to parse the API specification and create fuzzing attack scenarios based on what it defines, and outside of its definition, during “Automatic API Attack Tool” at Arsenal

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    Adhrit is an open-source Android APK reversing and analysis suite. The tool is an effort to find an efficient solution to all the needs of mobile security testing and automation. See a demo of how it works at Arsenal

    Poništi
  7. proslijedio/la je Tweet

    – The Hackers Arsenal Tools Portal » Top 5 Critical CVEs Vulnerability from 2019 That Every CISO Must Patch Before He Gets Fired !: via

    Poništi
  8. proslijedio/la je Tweet
    24. sij

    We're beyond stoked on the cutting edge macOS & iOS research, to be presented by world-class security researchers at "Objective by the Sea" v3.0: 🤗😍 Register today:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    Top 5 Critical CVE Vulnerabilities from 2019 That Every CISO Must Patch Before He Gets Fired ! We have reviewed the Top 2019 as well as the indicators generated up by our vFeed, Inc. vulnerability service.

    Poništi
  10. proslijedio/la je Tweet
    Poništi
  11. 22. sij

    Congratulations to all selected tools! For others please resubmit for USA and Europe!

    Poništi
  12. proslijedio/la je Tweet

    caught the right vulnerability intelligence indicators to help secure the vulnerable servers. We got indicators to scan, test, exploit, detect and fix the Fortinet VPN Servers vulnerable to CVE-2018-13379

    Poništi
  13. proslijedio/la je Tweet

    Planning to go to 2020. Come & visit our booth #1 at the Early Stage Expo Floor. Get some nice swag & learn how to enhance your product capabilities with actionable vulnerability intelligence indicators in 60 seconds !

    Poništi
  14. proslijedio/la je Tweet

    WARNING - Exploits released for the critical vulnerability (CVE-2020-0601) affecting Microsoft cryptographic functionality. Get our vulnerability intelligence indictors (ATT&CK T1130, Nessus Signatures, Microsoft Patches..) to assess & fix quickly the issue.

    Poništi
  15. proslijedio/la je Tweet
    15. sij

    ⌛️🛠️ Just under two weeks left to submit your open-source (macOS) security tool to 's "Aloha Armory" happening at "Objective by the Sea" v3.0 More info/to submit: Big mahalo to for sponsoring the "Aloha Armory" event 🙏

    Poništi
  16. proslijedio/la je Tweet

    Remote PoC in the wild For Mozilla Firefox/Firefox ESR memory corruption (CVE-2019-17024). Get vulnerability intelligence actionable indicators (exploits, signatures, rules, patches, targets, YARA, CAPEC, CPE, OVAL etc etc).

    Poništi
  17. proslijedio/la je Tweet

    Remote PoC in the wild For Mozilla Firefox/Firefox ESR memory corruption (CVE-2019-17024). Get vulnerability intelligence actionable indicators (exploits, signatures, rules, patches, targets, YARA, CAPEC, CPE, OVAL etc etc).

    Poništi
  18. proslijedio/la je Tweet

    WARNING : 25,000+ (NetScaler) endpoints vulnerable to CVE-2019-19781 & PoCs in the wild. Here are our vulnerability intelligence indicators (exploits, rules, patches, scanners signatures, targets..). This Flagged as 2019 Top 25 Most Dangerous Software Errors)

    Poništi
  19. proslijedio/la je Tweet

    Hurry Up, The First Edition Of macOS “Aloha” Armory will close 31st Jan 2020. So submit your "macOS" security tool and get a chance to showcase in v3.0

    Poništi
  20. 9. sij

    Booth #1, easy to find at in San Francisco!!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·