Br3akp0int

@tccontre18

copy paste: tweets are my own😉 Malware Researcher | Security Analyst | R.E. | FORENSIC | ML. interested in Pentesting | Red/Blue Team | Exploit Dev.

Vrijeme pridruživanja: studeni 2017.

Tweetovi

Blokirali ste korisnika/cu @tccontre18

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @tccontre18

  1. Prikvačeni tweet
    5. stu 2019.
    Poništi
  2. proslijedio/la je Tweet
    6. velj

    Two attempts to visualize the topology of "malware mordor" -- 110k malware samples random-projected onto a 2d surface, histogrammed to show concentration. Malware datasets contain huge volumes of near-duplicate binaries (~60%?). You can see that pretty clearly here.

    Poništi
  3. proslijedio/la je Tweet
    5. velj

    2020-02-05:🔥🆕 🔩Cfg 1⃣"prc":["psexec.exe","system"] 2⃣net":{"use":true,"ignore":{"use":true,"disk":true,"share":["ipc$","admin$"] 3⃣kill":{"use":true,"task":["reboot","restart","shutdown","logoff","back"]} h/t ➡️

    Poništi
  4. proslijedio/la je Tweet
    5. velj

    Analyzing WhatsApp Calls with Wireshark, radare2 and Frida by Marvin Schirrmacher 📱🔥

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    2020-02-04:🔥🆕 Manager 🐀V12.10F8 | 🇺🇦[FAN-CHAI,TOV] NSIS➡️ Script➡️NSM HookKeyboard➡️\.\KeyboardClass|PointerClass0 ftr [nskbfltr.NT.Wdf] KmdfService:nskbfltr,nskbfltr_wdfsect h/t MD5: 603ea83bd595e21d32b87139adf23612

    Prikaži ovu nit
    Poništi
  6. Poništi
  7. proslijedio/la je Tweet
    2. velj

    SettingSyncHost.exe as a LolBin cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo

    Poništi
  8. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  9. proslijedio/la je Tweet
    1. velj

    10 Python Machine Learning Projects on GitHub

    Poništi
  10. proslijedio/la je Tweet
    1. velj

    Windows 10 UAC bypass for all executable files which are autoelevate true.

    Poništi
  11. proslijedio/la je Tweet
    1. velj

    1\ Malware sandboxes are useful but extremely limited. Here's a malware call graph, and in red are the functions the malware actually *executed* when run in a sandbox -- a miniscule fraction of the malware's potential badness!

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    31. sij
    Poništi
  13. proslijedio/la je Tweet
    31. sij

    Demystifying the Windows Firewall – Learn how to irritate attackers without crippling your network - thanks for sharing

    Poništi
  14. proslijedio/la je Tweet
    25. sij
    Poništi
  15. proslijedio/la je Tweet
    24. sij

    modexp is one of my fav. researchers; while I often skim on details he is killing it with posts that combine an extensive and comprehensive research on interesting and often nuanced topics and a very well written narrative top quality right there

    Poništi
  16. proslijedio/la je Tweet
    24. sij

    | Vitali Kremez diving into the FIN6 “FrameworkPOS”, targeting payment card data from Point-of-Sale (POS) or eCommerce systems.

    Poništi
  17. 24. sij
    Prikaži ovu nit
    Poništi
  18. 24. sij
    Prikaži ovu nit
    Poništi
  19. 24. sij
    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    24. sij
    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    24. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·