Twitter | Pretraživanje | |
Didier Stevens
5-to-9 security researcher, Microsoft MVP, ISC Handler. Mostly IT security. & programming. & (hardware) hacking. & maldocs PDF/DOC. Avatar:
11.914
Tweetovi
5.118
Pratim
27.402
Osobe koje vas prate
Tweetovi
Didier Stevens proslijedio/la je tweet
SANS ISC 2. velj
Video: Stego & Cryptominers
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens 1. velj
New blog post "Overview of Content Published in January"
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens proslijedio/la je tweet
SANS ISC 1. velj
Wireshark 3.2.1 Released
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens proslijedio/la je tweet
Jean-François Maes 31. sij
New technical blogpost is up This one is about Parent PID spoofing complete with a python script to detect said spoofing. Read all about it here:
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens 31. sij
Odgovor korisniku/ci @Sam0rai
Take a look at the discussion of my PR, I linked to it in my blog post.
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens 31. sij
New blog post "etl2pcapng: Support For Process IDs"
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens 29. sij
Odgovor korisniku/ci @xme
I look up the file size on VirusTotal when I need it to speed up scan. Provided it has been submitted to VT of course :-)
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens 28. sij
New blog post "Update: hash. py Version 0.0.8"
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens 27. sij
New blog post "Update: format-bytes .py Version 0.0.11"
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens 26. sij
New blog post "Update: cut-bytes .py Version 0.0.11"
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens proslijedio/la je tweet
SANS ISC 15. sij
Great work by to help you test your systems for CVE-2020-0601 ( )
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens proslijedio/la je tweet
NVISO Labs 16. sij
Our researchers investigated the security of Progressive Web Apps (PWAs), a new type of application combining best of web and native apps. Read all about how they work and the security risks they impose in our latest blog post!
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens proslijedio/la je tweet
Bojan Zdrnja 15. sij
Nice idea by If you want to do the same thing in PowerShell, here's a short script that will generate the event in Windows Event Log, Application - great for blue teams to test detection:
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens 15. sij
For all of you out there in restricted corporate environments who need to test the processing of event log entries for CVE-2020-0601, I wrote some VBA code to generate this event.
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens 14. sij
New blog post "Analysis Of Unusual ZIP Files"
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens 13. sij
Odgovor korisniku/ci @cyb3rops
Put the payload list on pastebin, and updated the diary entry with this pastebin link:
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens proslijedio/la je tweet
SANS ISC 13. sij
Citrix ADC Exploits: Overview of Observed Payloads
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens proslijedio/la je tweet
SANS ISC 11. sij
quick snapshot from our honeypot for "vpns" scans / hour.
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens proslijedio/la je tweet
SANS ISC 11. sij
ADC Exploits are Public / Heavily Used (some attempt to install ).
Reply Retweet Označi sa "sviđa mi se"
Didier Stevens 11. sij
Odgovor korisniku/ci @pro_integritate
Reply Retweet Označi sa "sviđa mi se"