Samuel Hunter

@Trowalts

Segfaulting through life

cat ~/.bash_profile
Vrijeme pridruživanja: travanj 2009.

Tweetovi

Blokirali ste korisnika/cu @Trowalts

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Trowalts

  1. 4. velj

    Tired of those phishing payloads getting detected? Just added a practical on endpoint security evasion, with several techniques and it gets past those big names in the industry :) Come join the fun -

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    Today is excited to announce the release of our and known as . This team contains phenomenal talent from both offensive and defensive sides of , and provide unrivaled services to clients.

    Poništi
  3. 30. sij

    w00t! So excited to announce our new course at - Adversary Emulation and Active Defense! 4Day - Combining the spheres of offense and defense to teach core concepts.

    Poništi
  4. proslijedio/la je Tweet
    16. sij

    I recently gave a security talk where I changed my usual villain from "Bob the hacker" to "Jane the hacker". The audience appreciated the change from the standard "dude in a hoodie". Also, get in touch if you'd like some security talks/training/etc for your company/team.

    Poništi
  5. proslijedio/la je Tweet
    3. pro 2019.

    I was today years old when I learnt that you can run ELF using ld-linux. Useful when the executable bit is not set (and you can't change it).

    Poništi
  6. proslijedio/la je Tweet
    28. stu 2019.

    Earlier this year I got to hack at the original Doom using together with and . Here is a writeup with the details where we go through how we added our own cheat codes!

    Poništi
  7. proslijedio/la je Tweet
    9. lis 2019.
    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    25. kol 2019.

    The most important lesson from the story of an Astronaut hacking something from the ISS, is that the existing pew-pew maps have not been forward thinking enough. We need to do better.

    Poništi
  9. proslijedio/la je Tweet
    23. kol 2019.

    Tip: Looking for Passwords, API, Secrets, etc.? Always check in Online IDEs too. Gives a lot of working and . Example: site: “apikey” site: “aws_access_key_id”

    Poništi
  10. proslijedio/la je Tweet
    20. kol 2019.

    If you thought an 8 char password would be safe because it was complex you are wrong. It takes just 6 hours for our team to brute force the entire 8 character password space and only 4 minutes if your password is 7 characters.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    9. kol 2019.

    Nerves and excitement is high for my mobile hacking talk tomorrow @ 11 am, track 4 !

    Poništi
  12. proslijedio/la je Tweet
    29. srp 2019.

    The has now sent warning letters to companies that paid their AWS bills via credit card. , , I can't scream enough that you are forcing our tech companies to leave ZA. .insane

    Poništi
  13. 25. srp 2019.

    Just finished watching The Great Hack. It's sickening how we have became complacent with a relentless and continued abuse of our personal data.

    Poništi
  14. proslijedio/la je Tweet
    11. srp 2019.

    New blog post up! Bypassing a Docker AuthZ plugin and using docker-containerd for privesc.

    Poništi
  15. proslijedio/la je Tweet
    9. srp 2019.

    We discovered an issue with ADFS which allows brute-forcing all domain accounts from the external network, while bypassing the extranet lockout policy. This can easily lead to account compromise / massive accounts lockout.

    Poništi
  16. 1. srp 2019.

    Awesome work on bypassing AMSI for VBA - I owe someone a beer

    Poništi
  17. proslijedio/la je Tweet
    30. lip 2019.

    I've released a new version of BOtB,it contains some new features like scraping GCP metadata and some helper functions for pushing data to an S3 bucket,have phun!

    Poništi
  18. 13. velj 2019.

    Happy birthday ! May the shells rain down hard on this happy pwn day!

    Poništi
  19. proslijedio/la je Tweet
    12. velj 2019.

    The new vuln in runc, CVE-2019-5736 is beautifully ugly. Quick and dirty PoC:

    Poništi
  20. proslijedio/la je Tweet
    27. sij 2019.

    Today is & Protection Day. Take some time and reflect. * Have you changed your passwords ? * Have you updated your privacy settings? * Have you checked for any breaches on ? Take some time and help others around you become aware.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·