Tweetovi

Blokirali ste korisnika/cu @sn0wli0n

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @sn0wli0n

  1. proslijedio/la je Tweet

    This enigma-simulator project is an educational tool which simulates the workings of an Enigma machine, the Germans' main military encryption tool during World War II.

    Poništi
  2. proslijedio/la je Tweet
    prije 20 sati

    Today's study session 👩🏽‍💻💗 - Studying x86 Assembly(It has been a bit tedious not gonna lie) Sometimes I feel stupid lol - Reading more about Reverse Engineering. It's a topic I always liked but was scared to get more into. Does anyone have any Binary Exploitation exercises?

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    prije 20 sati
    Odgovor korisniku/ci

    Pretty cool python lib I found doing Patents on . This is pretty popular from a few vids I've seen. OSCP prep for basic buffer overflow Awesome list of resources:

    Poništi
  4. proslijedio/la je Tweet
    27. sij
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    Odgovor korisniku/ci

    One of the best resources out there

    Poništi
  6. proslijedio/la je Tweet
    2. velj

    Need a Reference Architecture? Check out this one showing how technology enables this strategy/access model. Slide 14 of CISO Workshop Module 3

    Poništi
  7. proslijedio/la je Tweet
    4. pro 2019.

    Point of View by Chinese U.S. Cyber Security Architecture

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  8. proslijedio/la je Tweet

    Cobalt Strike kit for Lateral Movement

    Poništi
  9. proslijedio/la je Tweet
    1. velj
    Poništi
  10. proslijedio/la je Tweet
    1. velj

    Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    31. sij
    Odgovor korisniku/ci

    It's a wide subject. Start by watching conference videos on youtube.. then choose something that looks interesting (fuzzing vs static analysis, mem corruption bugs vs logic bugs.. etc.. all require a different approach and tooling).

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    PSA to students: AWS Educate helps you get started with - Generous monthly free tiers for most services - $100 of annual credit to cover everything else - Free access to premium educational resources. Great for a hackathon or side project!

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    30. sij

    did a great webinar yesterday where he showed how and could be leveraged for your requirements. If you haven't seen it already, here is the link to watch the recorded session now.

    Poništi
  14. proslijedio/la je Tweet
    30. sij
    Poništi
  15. proslijedio/la je Tweet
    31. sij

    Fuck it, I can't focus at all today. It's a mess, sorry.. I've also uploaded the discussed bug to github. Maybe someone can make sense of it. It's a junction bug that's a little more complicated then a simple "bait and switch". Hope it's useful to someone.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    29. sij

    Need a SOC Reference Architecture? Check out this one we put together to show how Microsoft technology integrates into a SOC. Slide 73 of Azure Security Compass -

    Poništi
  17. proslijedio/la je Tweet
    30. sij
    Poništi
  18. proslijedio/la je Tweet
    29. sij
    Odgovor korisnicima i sljedećem broju korisnika:

    I finally got around to publishing my Sysmon deployment method. Hope people find it useful:

    Poništi
  19. proslijedio/la je Tweet
    30. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·