Tweetovi

Blokirali ste korisnika/cu @thebabaduke

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @thebabaduke

  1. proslijedio/la je Tweet
    4. velj

    x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 Often AVs rely on simple signatures to detect malicious software and I needed a tool in order to confirm this behavior and be able to produce a working bypass. That’s why I wrote x0rro.

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.

    Poništi
  3. proslijedio/la je Tweet
    1. velj

    Java jdbc (deserialization) vulnerability automated exploitation

    Poništi
  4. proslijedio/la je Tweet

    How to play the long game.

    Poništi
  5. proslijedio/la je Tweet
    24. sij

    Here's a cool trick to break out of AppLocker in Citrix environment: 1. Open a dummy RTF file in wordpad 2. Add ftp.exe as an object 3. Click to open ftp (or other similar apps) 4. ftp>!{commmand/app to run} for example: ftp>!cmd <-- blocked? ftp>!powershell <-- not blocked?:)

    Poništi
  6. proslijedio/la je Tweet
    22. sij

    How to Build an Automated Recon Pipeline with Python and Luigi - Part I

    Poništi
  7. proslijedio/la je Tweet
    22. sij

    Possibly one of the best series in RE for malware analysis from basic to advance, , not new but not obsolete.

    Poništi
  8. proslijedio/la je Tweet
    22. sij
    Poništi
  9. proslijedio/la je Tweet
    22. sij

    Finally uploaded video of my talk "Expanding the Reach of Fuzz Testing", which I gave at UMass Amherst! Introduces PerfFuzz, FuzzFactory, FairFuzz, Zest + JQF, RLCheck and Autopandas 😃

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    17. sij

    Very cool tool: Microsoft Application Inspector to identify open source components in software

    Poništi
  11. proslijedio/la je Tweet
    13. sij

    Tricks of the Trade from 5+ years in Offensive Cyber Security - thanks for sharing

    Poništi
  12. proslijedio/la je Tweet
    12. sij
    Odgovor korisniku/ci
    Poništi
  13. proslijedio/la je Tweet
    11. sij
    Poništi
  14. proslijedio/la je Tweet
    10. sij

    If you are interested in cryptography this free book is a must-read.

    Poništi
  15. proslijedio/la je Tweet
    11. sij

    A CVE-2019-19781 is this easy – 1. Traversal to vpns folder, traversal in the NSC_HEADER + to write a malicious bookmark to the /netscaler/portal/templates/ folder (1st HTTP request), 2. Passing that template through the Template Toolkit (2nd request)

    Poništi
  16. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  17. proslijedio/la je Tweet
    1. sij

    Turbolist3r - Subdomain Enumeration Tool With Analysis Features For Discovered Domains

    Poništi
  18. proslijedio/la je Tweet
    31. pro 2019.

    New year gift 🎉 Set up a free server to exploit blind vulnerabilities! 1. 2. sudo apt-get install apache2 pagekite 3. add "ServerName localhost" to /etc/apache2/apache2.conf 4. 80->8080 in /etc/apache2/ports.conf 5. pagekite 8080

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    31. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    31. pro 2019.

    CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 4/4)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·