Twitter | Pretraživanje | |
James Ellis
Product Development Analyst . All views expressed are my own.
39
Tweetovi
288
Pratim
78
Osobe koje vas prate
Tweetovi
James Ellis proslijedio/la je tweet
Richie Cyrus 9. kol 2018.
Excited and honored to speak at the first ever Objective by the Sea conference among amazing speakers in the MacOS community!! 💻🔒
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
Matt Graeber 10. kol 2018.
Code, slides, and whitepaper for the "Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology" talk and I gave at .
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
Alex Ionescu 6. kol 2018.
Just in time for , I've released the Ring 0 Army Knife (r0ak) at . Full driver-less, built-in, Windows 8+ Ring 0 arbitrary read/write/execute debugging tool for HVCI/Secure Boot/WDAG environments where local debugging is often impossible to set up.
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
Matt Graeber 31. srp 2018.
Odgovor korisniku/ci @mattifestation
Here's a sampling of behavioral signatures that I find to be interesting. Odds are there's at least one technique in this list that you use regularly.
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
Matt Graeber 31. srp 2018.
Knowledge of what AV signatures exist should be in your OPSEC playbook. The "behavior" signatures should be studied the most. This one-liner will group all Defender sigs by category. (Get-MpThreatCatalog).ThreatName | Group { $_.Split(':')[0] } | Sort Count -Descending
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
securityfreax 29. srp 2018.
Useful hardening baseline script by Microsoft. If you are running Windows 10 you should really apply this. Hardening Baseline for Windows 10 (1803) |
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
hasherezade 29. srp 2018.
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
Neil Hughes 24. srp 2018.
I chat with and Paul Kenyon from who reveal that Co-CEOs can be successful in tech and why they both believe that the most successful leaders find their opposite and learn from them every day.
Reply Retweet Označi sa "sviđa mi se"
James Ellis 23. srp 2018.
Really looking forward to this talk on Password Vaults from next month
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
Ian Pitfield 20. srp 2018.
Crying into Binance charts
Reply Retweet Označi sa "sviđa mi se"
James Ellis 21. srp 2018.
Domain Penetration Testing: Using , , & to get Domain Admin via
Reply Retweet Označi sa "sviđa mi se"
James Ellis 21. srp 2018.
A Red Teamer’s Guide to GPOs and OUs by via
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
Boston ABCD 19. srp 2018.
Thx for the gift of super cool & helmets for who r in great need! in the making. Thx
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
Proofpoint 19. srp 2018.
TA505 Abusing SettingContent-ms within PDF files to Distribute FlawedAmmyy RA. via research team.
Reply Retweet Označi sa "sviđa mi se"
James Ellis 19. srp 2018.
Stealthy Hidden in Images Takes to GoogleUserContent: via
Reply Retweet Označi sa "sviđa mi se"
James Ellis 19. srp 2018.
Mining off the Land: Enabled by Native Windows Tools via
Reply Retweet Označi sa "sviđa mi se"
James Ellis 19. srp 2018.
Nice alternative to using from to escalate to SYSTEM with a Scheduled Task on a local or remote computer
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
Avecto 18. srp 2018.
Companies must focus on being competitive in the areas they are strongest in to attract customers." - discusses 11 Approaches Tech Firms Can Use To Stand Out in
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
BOMGAR 18. srp 2018.
What are the signs of a breach? Are you catching them all? Or do you have a false sense of security when it comes to all things cyber within your organization? More insight in : .
Reply Retweet Označi sa "sviđa mi se"
James Ellis proslijedio/la je tweet
Avecto 22. velj 2018.
88% of all Critical vulnerabilities reported by Microsoft over the last five years could have been mitigated by removing admin rights
Reply Retweet Označi sa "sviđa mi se"