xer0dayz

@xer0dayz

Founder of . Creator of Sn1per. Hacking since '93. 20+ yrs. IT exp. Sr. Penetration Tester. OSCE/OSCP/CISSP

Vrijeme pridruživanja: studeni 2014.

Tweetovi

Blokirali ste korisnika/cu @xer0dayz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @xer0dayz

  1. Prikvačeni tweet
    23. pro 2019.
    Poništi
  2. 1. velj
    Poništi
  3. proslijedio/la je Tweet
    30. sij

    Jim Sanborn, the artist behind the CIA's famed Kryptos sculpture, has revealed a new clue to help solve his puzzle - the last part has remained unsolved for 30 yrs. The new clue is "NORTHEAST". (I wrote about a previous clue here: )

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    29. sij
    Poništi
  5. proslijedio/la je Tweet
    27. sij
    Poništi
  6. proslijedio/la je Tweet
    27. sij

    Final reminder! Our upgrade special to save $49 ends 1/31/2020! If you are planning on upgrading to Sn1per Professional v8.0, don't miss out!

    Poništi
  7. proslijedio/la je Tweet
    24. sij

    Discover your external attack surface and scan for before attackers do with Sn1per Professional! - Scheduled scans & continuous monitoring - Slack notifications for changes (new domains, new URL's, etc.) + more!

    Poništi
  8. proslijedio/la je Tweet
    22. sij

    Sn1per v8.1 Released! - Added Citrix Gateway Arbitary Code Execution CVE-2019-19781 vulnerability detection - Added Pulse Secure VPN Arbitrary File Disclosure CVE-2019-11510 exploit + Various fixes and improvements

    Poništi
  9. proslijedio/la je Tweet
    21. sij
    Poništi
  10. proslijedio/la je Tweet
    19. sij

    BIG thanks to for featuring Sn1per Professional on "Selecting the Right Tool(s) for Your Red Team Operation" on - Full video: Preview:

    Poništi
  11. proslijedio/la je Tweet
    18. sij
    Poništi
  12. proslijedio/la je Tweet
    17. sij

    Perform external attack surface discovery with Sn1per Professional v8.0! - Enumerate all sub-domains - Discover open ports and services - Find live web hosts - Scan for vulnerabilities + more!

    Poništi
  13. proslijedio/la je Tweet
    11. sij
    Poništi
  14. proslijedio/la je Tweet
    8. sij
    Poništi
  15. proslijedio/la je Tweet
    14. sij

    Now that it's all public: 1) CVE-2020-0601 - Windows doesn't properly validate X.509 certificate chains. 2) CVE-2020-0609, CVE-2020-0610 - Windows Remote Desktop Gateway (not to be confused with RDP proper) unauthenticated RCE.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    13. sij

    Albany, New York Airport pays off Ransomware

    Poništi
  17. proslijedio/la je Tweet
    13. sij
    Poništi
  18. proslijedio/la je Tweet
    Poništi
  19. proslijedio/la je Tweet
    11. sij

    We added detection for CVE-2019-19781 to our Command Execution Add-on to quickly scan for vulnerable hosts in your environment. Check the updates panel for more details! 😎

    Poništi
  20. proslijedio/la je Tweet

    Attention! Hackers actively exploiting a new critical 0-day bug (CVE-2019-17026) in that could let remote attackers take complete control over your computers just by tricking you into visiting a malicious site. Read ➤ Update your browser now!

    Poništi
  21. proslijedio/la je Tweet
    9. sij

    CVE-2019-15999 : Cisco DCNM JBoss 10.4 Credential Leakage

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·