Tweetovi

Blokirali ste korisnika/cu @xsorl

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @xsorl

  1. proslijedio/la je Tweet

    Interesting, a mysterious bug report I've been struggling to track down just got solved. It turns out, 32-bit getcontext() can return failure if run inside a docker container. Apparently the cause is the default docker seccomp policy doesn't allow sigprocmask() (wtf?). 😓

    Poništi
  2. proslijedio/la je Tweet
    27. srp 2019.

    Detecting UAC Bypass by Mocking Trusted Directories using Sysmon example was uploaded to the ATT&CK EVTX repo -> [125 evtx, more than 130 techniques✌️] , BTW same UACbypass used recently by TA505 APT group, consider multi spaces!

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet

    Explorer (you can simply call it as "WKE") is a free but powerful Windows kernel research tool. It supports from Windows XP to Windows 10 (32-bit and 64-bit).

    Poništi
  4. proslijedio/la je Tweet
    22. srp 2019.

    Introducing the Office 365 Attack Toolkit, a new blog post and tool release by

    Poništi
  5. proslijedio/la je Tweet
    7. srp 2019.

    It took just one Sunday morning of work to go from zero to 0day on a Solaris 11.4 box! I guess I haven’t lost my swing 🐛🚿

    Poništi
  6. proslijedio/la je Tweet
    3. srp 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    nothing. These policies are not new. They are just clarifying policies they have for a long time. so far we had no issues. Any accounts and videos that had troubles we were able to resolve. I see no need for panic

    Poništi
  7. proslijedio/la je Tweet
    1. srp 2019.

    Is this the pinnacle demonstration of Red Team vs. Blue Team?

    Poništi
  8. proslijedio/la je Tweet

    I'm very disappointed with 's new policy which disallows educational videos on security. There are tens of thousands of hackers out there making the world a better place due to things like and this puts their future in jeopardy. Please consider reversing this.

    Poništi
  9. proslijedio/la je Tweet
    21. lip 2019.

    Just published the slides of my "IronPython OMFG v2.0" talk yesterday at on github here

    Poništi
  10. proslijedio/la je Tweet
    22. lip 2019.

    If you pentest, red team or defend windows environments, this should be required reading. Wish I was in the room when this talk was presented. Please release this video ASAP. :)

    Poništi
  11. proslijedio/la je Tweet
    21. lip 2019.

    New screenshare feature to spy on your target’s screen is niiice and very reactive ! Thx

    Poništi
  12. proslijedio/la je Tweet
    18. lip 2019.

    You know the old python -m SimpleHTTPServer trick? pyftpdlib is a nice FTP equivalent. pip3 install pyftpdlib python3 -m pyftpdlib

    Poništi
  13. proslijedio/la je Tweet
    29. tra 2019.

    It's finally here! I have published my Intro to Android App Reverse Engineering workshop! If you're interested in learning how to begin RE'ing Android apps (both DEX and native code), check out this workshop.

    Screenshot of front page of the Android app reversing workshop.
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    22. svi 2019.
    Odgovor korisnicima
    Poništi
  15. proslijedio/la je Tweet
    28. ožu 2019.

    Ever wanted to better understand how Windows Defender implements its signatures? Here's a first step. I wrote a thing to decompress WDAV .vdm files.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    30. sij 2019.

    Hay que entender que para llegar a dominar las destreza sin importar profession, la práctica es clave y la misma tiene que en su mayoría ser una de reto de manera que haya crecimiento y mejora. Lo digo por que muchos no le ponen prioridad a su lab o se enfocan en lo que ya saben

    Poništi
  17. proslijedio/la je Tweet

    Hey , I just tested your attack on a 2019 DC with 2019 Exchange (without separated administration at install) It works like a charm, so much class with this attack🤘 I'm so loving it. Thank you for your work 😘 and for too 🥰

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    24. sij 2019.

    Writeup for my winhttpd challenge (Windows 10 pwn at Insomni'hack teaser)

    Poništi
  19. proslijedio/la je Tweet
    6. sij 2019.

    The Chrome 69 exploit I wrote with and is public now. Check out that CTF quality! lolz

    Poništi
  20. proslijedio/la je Tweet
    19. pro 2018.

    Have Just reported an interesting pre-auth(with Overall/Read) RCE to Jenkins! (But if this chained with the bug CVE-2018-1000861 I reported before, it could execute arbitrary code without any ACL restrictions) Will post a blog soon after all the responsible disclosure process :P

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·