(ca)sey

@verbumrosini

Strategic Advanced Application & Software SecuritY (). Fides && Ratio. Nothing became some -thing, -how; Word exe.

(c) mmxx / ca. mmxvii
Vrijeme pridruživanja: rujan 2017.

Tweetovi

Blokirali ste korisnika/cu @verbumrosini

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @verbumrosini

  1. 1. velj
    Poništi
  2. 24. sij
    Poništi
  3. 21. sij
    Poništi
  4. proslijedio/la je Tweet
    18. sij

    Here my GitHub with many scripts useful for red teamers - Enjoy!

    Poništi
  5. proslijedio/la je Tweet
    16. sij

    We have a working proof-of-concept exploit for ‘Whose Curve is it Anyway?’ — NSA’s bug in Microsoft’s Crypto API. Read on for our explainer:

    Poništi
  6. proslijedio/la je Tweet
    14. sij

    We need your help to select the top 10 web hacking techniques of 2019! Cast your vote here:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    14. sij

    COMMENTARY ON CVE-2020-0601: I have been speaking to several players on this on background and there are a few things they want to highlight / clarify based on the public discourse so far.

    Prikaži ovu nit
    Poništi
  8. 14. sij

    The world hunting Windows Event ID 1 ...

    Poništi
  9. 14. sij

    CVE-2020-0601: A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.

    Poništi
  10. proslijedio/la je Tweet
    26. stu 2019.

    If you haven’t read the original Stantinko paper then you should This malware family stands out to me for its subtle yet extensive modularity and subversive techniques. In 2017 this family had few if any detections by any security vendor.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    25. stu 2019.

    It's great that people are reading this and applying it. But when you're testing a race condition on registration, there is no need to use my email address!

    Poništi
  12. proslijedio/la je Tweet
    18. stu 2019.

    We have open sourced our legal documentation used for physical penetration tests. The purpose is to help the community and organizations protect their employees when conducting testing. Includes three docs: MSA SOW Authorization Letter

    Poništi
  13. proslijedio/la je Tweet
    4. stu 2019.

    FFRIエンジニアブログ、第二十四回目はFFRI Dataset 2019の紹介記事です。FFRI Dataset 2018からパワーアップした、マルウェア・クリーンウェアの表層情報データセットについて、ご紹介いたします。

    Poništi
  14. proslijedio/la je Tweet

    A message from me and the support for the consultants who were wrongfully charged and arrested and a call for all charges to be dropped .

    Poništi
  15. 24. lis 2019.

    And special thanks (and even probably some apologies) to , , , and . You all have made these years unforgettable and have made a lasting impression on my work in this industry. To the years to come ... Cheers!

    Prikaži ovu nit
    Poništi
  16. 24. lis 2019.

    12 years ago this month, I was given an amazing opportunity to start a career in infosec. I made mistakes and have regrets. But I try to grow each day. I'm so thankful for the mentors and friends along the way, and for the unsung people who (+/-) impact me here daily. Thank you!

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    24. lis 2019.
    Poništi
  18. proslijedio/la je Tweet
    24. lis 2019.

    If you're not already aware of it, Apple's MacOS XProtect is fueled by YARA and UXProtect () is a graphical frontend from (the wizard behind all the awesome utilities) and the fellas from .

    Poništi
  19. proslijedio/la je Tweet
    24. lis 2019.

    Our team represented by published technical analysis of the checkm8 exploit

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·