| Pretraživanje | Osvježi |
|
Paula Januszkiewicz
@PaulaCqure
|
3 h |
|
Let’s make noise for @jaysonstreet and the great talk we had during #BHEU in London! 📣
If you want to find out how to avoid becoming a target of social engineering and why robbing the right bank is so important, watch the video below! 👇🏽
cqu.re/jayson
#stayCQURE
|
||
|
|
||
|
CQURE Academy
@CQUREAcademy
|
3 h |
|
How to protect yourself from becoming a target of social engineering? 🔒
Watch our special #BHEU interview with @jaysonstreet and find out!
P.S. @PaulaCqure made sure to ask Jason the most burning question, so you’d better click “play” now!
🔥 cqu.re/jayson
|
||
|
|
||
|
jonathan Afek
@JonathanAfek
|
27. sij |
|
Can't wait to present the progress we've made since #BHEU at @offensive_con! tfp0, full disk mounts with our own block device driver, most of the iOS services running, ssh and a textual framebuffer. #offensivecon pic.twitter.com/xfEaCdgraH
|
||
|
||
|
Niemand 🇦🇷
@niemand_sec
|
7. sij |
|
The recording of my talk "Unveiling the Underground World of Anti-Cheats" at BlackHat Europe 2019 is now online! :D
A pleasure to be part of @BlackHatEvents !!
youtube.com/watch?v=yJHyHU…
#BHEU #security #infosec
|
||
|
|
||
|
Black Hat
@BlackHatEvents
|
28. pro |
|
Five #BHEU Briefings recordings are now available on the #BlackHat YouTube Channel. Watch them here: ow.ly/501R50xJcQt
|
||
|
|
||
|
Niemand 🇦🇷
@niemand_sec
|
20. pro |
|
My @BlackHatEvents slides on "Unveiling the Underground Word of Anti-Cheats" are now available on the @Immunityinc site.
You can find additional information about bypasses to multiple Anticheats (new info at the end)
immunityinc.com/resources/pape…
#reversing #security #BHEU #Blackhat pic.twitter.com/PgsluKijFE
|
||
|
||
|
Matthias Luft
@uchi_mata
|
6. pro |
|
Slides and material from our talk on attacking container build systems from #BHEU are now online: github.com/heroku/bheu19-…
And so is Terrier, the CI-oriented container integrity verification tool (mainly due to the amazing effort of the @brompwnie): github.com/heroku/terrier/
|
||
|
|
||
|
LimitedResults
@LimitedResults
|
6. pro |
|
Slides from #BHEU 2019 available here:
limitedresults.com/wp-content/upl… pic.twitter.com/s4gWbOqAUG
|
||
|
||
|
Black Hat
@BlackHatEvents
|
5. pro |
|
Thanks to all of the #BHEU 2019 Arsenal Presenters, Attendees and of course the @ToolsWatch Team for a great showing of open-source tools! twitter.com/ToolsWatch/sta…
|
||
|
|
||
|
ToolsWatch - Hackers Arsenal 🛠️👁️
@ToolsWatch
|
5. pro |
|
Ok folks that's a wrap !!!! Thanks everyone for making this #BHEU Arsenal London 2019 an awesome place to catch up with old and new friends from all over the world !! Hugs to @Jasminanicolee Steve Rich and @BlackHatEvents ... Special hugs to our beloved chairhacker @MadelineS_M pic.twitter.com/XIGgArXX1n
|
||
|
||
|
Cornelius Aschermann
@is_eqv
|
5. pro |
|
|
||
|
|
||
|
Mohammed Aldoub
@Voulnet
|
5. pro |
|
للتو انتهيت من عرض أداة برق بنجاح في مؤتمر بلاكهات لندن بحمدالله.
Just finished presenting barq in #BHEU Arsenal.
Barq is the AWS post exploitation attack tool. Find it here:
github.com/Voulnet/barq
@ToolsWatch pic.twitter.com/HCYoMr1eUV
|
||
|
||
|
Decalage
@decalage2
|
5. pro |
|
Final slides of my presentation yesterday at Black Hat Europe 2019, about malicious VBA macros and recent advances in the attack & defence sides:
decalage.info/bheu2019
Featuring #oletools/olevba, ViperMonkey, MacroRaptor, EvilClippy
#BHEU #BHEU2019 pic.twitter.com/iT8iqvIM8E
|
||
|
||
|
Miriam Wiesner
@MiriamXyra
|
4. pro |
|
Do you want to know how to use Windows Event Logs to improve your detection, matched to MITRE ATT&CK? Join my session at @BlackHatEvents Arsenal station 6 at 3:45 p.m. and find out how my open source tool #EventList can help you!
#BHEU pic.twitter.com/z7GM3MGOUT
|
||
|
||
|
Ali Abbasi
@bl4ckic3
|
4. pro |
|
Today @ScepticCtf presented our work on Siemens S7-1200v4 bootloader reversing at #bheu. We will present more about Siemens ADONIS RTOS later this year at #36c3 and will present the most complete package including releasing the code for using the special access feature at #S4x20. pic.twitter.com/Q5E5ITLFfb
|
||
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
Next up...
I want to be James Kettle @albinowax when I grow up. He's singlehandedly made appsec sexy again after years of hardly any decent research. This little trick will make the bug bounty scene go mad.
#BHEU pic.twitter.com/BxjEgKRDW7
|
||
|
||
|
jan
@janfajfer
|
4. pro |
|
Insights into the business of a new Android botnet called Geost. @eldracote @anshirokova and @MaryJo_E revealing the secrets of a cybercrime group at #BlackHatEurope2019 #BlackHat #BHEU pic.twitter.com/XaXKwWXS6q
|
||
|
||
|
Grifter
@Grifter801
|
4. pro |
|
I'm sure when I look back at Black Hat Europe 2019, one of my favorite moments will be "That time @MalwareJake cosplayed as China." 😂 #bheu #blackhat pic.twitter.com/yRqMPM9CpY
|
||
|
||
|
ElevenPaths
@ElevenPaths
|
4. pro |
|
TheTHE (The Thread Hunting Experience) es el nombre de la herramienta que presentan hoy @ssantosv, @dgn1729 y @psaneme en @BlackHatEvents. ¿Quieres saber más?
Lee nuestro post➡️ow.ly/6AgA30pYTnu
Info oficial del evento➡️ow.ly/xlro30pYTnO
#SoloHackers #BHEU pic.twitter.com/kxnMno7rCR
|
||
|
||
|
Decalage
@decalage2
|
4. pro |
|
#oletools 0.55 is finally out, just in time for #BHEU!
Main changes: olevba += SLK file parser and XLM macro extraction, VBA stomping detection
More info: github.com/decalage2/olet…
How to install/update: pip install -U oletools pic.twitter.com/zGEJqoQRUy
|
||
|
||