Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @zero_wf
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @zero_wf
-
Danila Parnishchev proslijedio/la je Tweet
Join me and
@CptJesus on Tuesday, February 11th as we unveil#BloodHound 3.0! We will demo new attack primitives, performance improvements, and changes in the GUI. Register for the webinar here (recording available afterwards): https://specterops.zoom.us/webinar/register/WN_Ak7pi_zxSM28HBIl5RIVWw …pic.twitter.com/pP4BxRE0tN
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je Tweet
A collection of UNIX hacking tips & tricks :https://github.com/hackerschoice/thc-1001-tips-and-tricks/blob/master/README.md …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Danila Parnishchev proslijedio/la je Tweet
A collection of PHP & ASP shells https://github.com/backdoorhub/shell-backdoor-list …pic.twitter.com/MXZJ08abTV
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je Tweet
Let me save you some clicks. Direct links to the POCs are here: KudelskiSec POC - https://github.com/kudelskisecurity/chainoffools … Ollypwn POC - https://github.com/ollypwn/cve-2020-0601 …pic.twitter.com/MLCkKyjx3k
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je Tweet
As promised, I've documented some additional information from
@TripwireInc research into#citrix#netscaler#cve201919781. There is a bit of misleading information out there so I hope this will clear the air a bit. https://www.tripwire.com/state-of-security/vert/citrix-netscaler-cve-2019-19781-what-you-need-to-know/ … cc:@sans_isc@johullrichHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je Tweet
We’re excited to announce the initial release of ATT&CK for ICS! You can find the ICS knowledge base at https://attack.mitre.org/ics and a blog post by
@ojalexander explaining what’s new and different here: https://medium.com/mitre-attack/launching-attack-for-ics-2be4d2fb9b8 …. Thank you to everyone who helped us get here!pic.twitter.com/xouwwdufV1Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je Tweet
SSH Pentesting Guide - A Comprehensive Guide to Breaking SSH :https://community.turgensec.com/ssh-hacking-guide/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Interesting blog post about tesla wi-fihttps://keenlab.tencent.com/en/2020/01/02/exploiting-wifi-stack-on-tesla-model-s/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Siemens security advisory on SPPA T3000 system issues found by
@kl_secservices https://cert-portal.siemens.com/productcert/pdf/ssa-451445.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je Tweet
A guide on power plant automation and its security issues on
#36c3 conference. Slides and tools from our talk https://github.com/klsecservices/Publications/raw/master/36c3-Security%20of%20turbine%20control%20systems.pdf … kudos to@repdet@_moradek_@Alender911@epotseluevskaya@zero_wf@574rzpic.twitter.com/aLGEHLUlhr
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je Tweet
Friday night tweetin' https://github.com/cseagle/blc for those that want their Ida and their Ghidra too. Chock full o' bugs no doubt.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Great talk from
@kl_secservices on power generation turbines software security! The whitepaper is about to be released) Check https://github.com/klsecservices after release. And don't forget to check our s7scan tool and share your feedback, always welcome)https://twitter.com/GiftsUngiven/status/1210882476316483586 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je Tweet
New writeup, one of my favorite bugs
-
Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty
https://samcurry.net/filling-in-the-blanks-exploiting-null-byte-buffer-overflow-for-a-40000-bounty/ …
Featuring...
@d0nutptr@0xacb@Regala_@JLLiS@Yassineaboukir@plmaltaispic.twitter.com/RomLgdCcSC
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je Tweet
Analysts’ predictions on growing corporate threats for 2020
#cloud#insidershttps://github.com/klsecservices/Publications/blob/master/Corporate%20security%20prediction%202020%20Cloud%20technology%20and%20insiders.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je Tweet
Today
@ScepticCtf presented our work on Siemens S7-1200v4 bootloader reversing at#bheu. We will present more about Siemens ADONIS RTOS later this year at#36c3 and will present the most complete package including releasing the code for using the special access feature at#S4x20.pic.twitter.com/Q5E5ITLFfb
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je Tweet
What? A library that wraps IDA decompiler API and makes it usable? *and* documented? We just released a thing. Blog: https://www.fireeye.com/blog/threat-research/2019/11/fidl-flare-ida-decompiler-library.html … Github: https://github.com/fireeye/FIDL Docs!!!: https://fidl.readthedocs.io/en/latest/
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je Tweet
Stories and lessons from Incident Response practice by Pavel Kargapoltsev on
#ZeroNights 2019. Thanks for all the questions from audience and organisers for great event! Get the slides https://github.com/klsecservices/Publications/raw/master/2019-ZeroNights-Kargapoltsev-Stories%20and%20lessons%20from%20daily%20DFIR.pdf … ATT&CK inside!#DFIR#blueteampic.twitter.com/0PMwivWeOZ
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Danila Parnishchev proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Danila Parnishchev proslijedio/la je Tweet
Most used
#MITRE ATT&CK techniques and more operational security stats in our#threathunting report https://github.com/klsecservices/Publications/blob/master/MDR_report_H1_2019_eng_final.pdf …pic.twitter.com/a42QInJw4f
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.