Twitter | Pretraživanje | |
44CON
UK's best combined Information Security Conference and training event. DM's not monitored. Newsletter out every Tuesday:
6.112
Tweetovi
69
Pratim
10.624
Osobe koje vas prate
Tweetovi
44CON 7 h
Exploring the iOS screen frame-buffer– a kernel reversing experiment
Reply Retweet Označi sa "sviđa mi se"
44CON 9 h
Odgovor korisniku/ci @rag_sec @dive_monkey @tamonten
They definitely need to be a thing.
Reply Retweet Označi sa "sviđa mi se"
44CON 9 h
Avocent IP KVMs hacking - or how I got cables from any vendor to work on my Dell 1082DS (x-post from /r/homelab)
Reply Retweet Označi sa "sviđa mi se"
44CON 10 h
AMSI (Antimalware Scripting Interface) bypass by patching memory seen in the wild
Reply Retweet Označi sa "sviđa mi se"
44CON 12 h
Google introduces OpenSk, an Open Source security key implementation
Reply Retweet Označi sa "sviđa mi se"
44CON 15 h
Get all the latest training and info in one weekly email. Next issue out tomorrow
Reply Retweet Označi sa "sviđa mi se"
44CON 15 h
Exploit PoC: HyperV Admin to System
Reply Retweet Označi sa "sviđa mi se"
44CON 18 h
emotet_protection_tools: This repository provides tools to fight against Emotet malware. You can protect your system using these tools
Reply Retweet Označi sa "sviđa mi se"
44CON 2. velj
Kraken Identifies Critical Flaw in Trezor Hardware Wallets
Reply Retweet Označi sa "sviđa mi se"
44CON 2. velj
I’ve been developing Kali i3-gaps’ ISO since November and I finally made it fully functional. If you want to give it a try, check it out over at my Gitlab.
Reply Retweet Označi sa "sviđa mi se"
44CON 2. velj
Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers
Reply Retweet Označi sa "sviđa mi se"
44CON 2. velj
Detection Engineering using Apple’s Endpoint Security Framework
Reply Retweet Označi sa "sviđa mi se"
44CON 2. velj
"How to set up Secure LDAP for Active Directory — Astrix"
Reply Retweet Označi sa "sviđa mi se"
44CON 2. velj
Samesite by Default and What It Means for Bug Bounty Hunters
Reply Retweet Označi sa "sviđa mi se"
44CON 1. velj
OK Google: bypass the authentication!
Reply Retweet Označi sa "sviđa mi se"
44CON 1. velj
Reply Retweet Označi sa "sviđa mi se"
44CON 1. velj
Scripting Macs With Malice | How Shlayer and Other Malware Installers Infect macOS | SentinelOne
Reply Retweet Označi sa "sviđa mi se"
44CON 1. velj
Azure Sentinel webinar: Threat Hunting (part 2)
Reply Retweet Označi sa "sviđa mi se"
44CON 1. velj
An attacker logged into the honeypot and ran a batch file that created a vbs script that attempted to download a possible coin miner. The attacker then downloaded an application named Defender Control to turn off Defender. See the timeline, details, and…
Reply Retweet Označi sa "sviđa mi se"
44CON 1. velj
Remote Cloud Execution – Critical Vulnerabilities in Azure Cloud Infrastructure
Reply Retweet Označi sa "sviđa mi se"