todaro

@tod4ro

what do you want from me?

Vrijeme pridruživanja: veljača 2015.

Tweetovi

Blokirali ste korisnika/cu @tod4ro

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @tod4ro

  1. Prikvačeni tweet
    28. tra 2019.

    I have already contacted paypal cn, they have already taken the feature off to prevent the vulnerability from being exploited.

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    DeStroid - Fighting String Encryption in Android Malware [SLIDES + REPO]

    Poništi
  3. proslijedio/la je Tweet
    2. velj
    Poništi
  4. proslijedio/la je Tweet
    30. sij
    Poništi
  5. proslijedio/la je Tweet
    30. sij
    Poništi
  6. proslijedio/la je Tweet
    31. sij

    Code injection in Workflows leading to SharePoint RCE (Analysis of CVE-2020-0646)

    Poništi
  7. proslijedio/la je Tweet
    31. sij
    Poništi
  8. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  9. proslijedio/la je Tweet
    2. velj

    wireshark dissector for Apple’s propriety continuity protocol

    Poništi
  10. proslijedio/la je Tweet
    prije 21 sat

    I’ve just uploaded my Jailbreak for the iPad Pro (2017) to GitHub. Right now, SSH and Sileo can be installed. Due to lack of devices, I cannot currently implement support for other devices. Feel free to create PRs if you would like to help me!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    2. velj

    Pointer Compression in V8 and what it means for browser exploitation by

    Poništi
  12. proslijedio/la je Tweet
    2. velj

    调度系统设计精要 历时 2 个月,全文 2 万字,深入调度器的设计与实现,源码级分析 Linux、Go 和 Kubernetes 调度器从无到有,从简单到复杂的演变过程。

    Poništi
  13. proslijedio/la je Tweet
    31. sij

    Someone dropped a PHP zero-day on GitHub. Talked to the PHP team last night. Bug requires local foothold to exploit, so not usable for remote attacks. Also, this is the second exploit for this "disable_functions bypass" in the last few months.

    Poništi
  14. proslijedio/la je Tweet
    1. velj

    is a C# utility to steal a user's password using a fake Windows logon screen. This password will then be validated and saved to disk. Useful in combination with 's execute-assembly command.

    Poništi
  15. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  16. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  17. proslijedio/la je Tweet
    20. sij

    "Cacti 1.2.8 allows Remote Code Execution (by privileged users) via shell metacharacters in the Performance Boost Debug Log field of poller_automation.php. "

    Poništi
  18. proslijedio/la je Tweet
    20. sij

    For those of you interested in hacking / reversing Nintendo Switch Games, I created an IDA script to help rename the stub functions that jump to the imported library functions. IDA doesn't always get them all. Check it out here:

    Poništi
  19. proslijedio/la je Tweet
    20. sij

    Open sourced a bit of automation around unpacking apps using devices;

    Poništi
  20. proslijedio/la je Tweet
    20. sij
    Poništi
  21. proslijedio/la je Tweet
    20. sij

    An attacker logged into the honeypot, dropped XMRig, mimikatz, and a bunch of usernames and passwords. See below for info on XMRig, intrusion summary, OPSEC fail, and IOCs.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·