| Tweetovi |
| Evangelos proslijedio/la je tweet | ||
|
Casey Smith
@subTee
|
1. velj |
|
Load encrypted PE from XML Attribute.
MSBuild is still the best.😅
github.com/XwingAngel/PEL…
MSBuild sets Property then calls Execute.
Use this example to decouple payloads & prove that all security products have a "Single File Bias".
Decouple payloads to subvert detection. pic.twitter.com/648rujlLQn
|
||
|
|
||
|
Evangelos
@lex0tanil
|
1. sij |
|
Stuxnet Analysis from @Amr_Thabet always great to read.
codeproject.com/Articles/24654…
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
Tanmay Ganacharya
@tanmayg
|
13. pro |
|
In-depth analysis of PowerShell-based downloader Trojan sLoad, which uses the Background Intelligent Transfer Service (BITS) almost exclusively as alternative protocol for data exfiltration and most of its other malicious activities
Details: microsoft.com/security/blog/… pic.twitter.com/7gqdW48N6b
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
Кириакос Экономоу
@kyREcon
|
5. pro |
|
#Symantec SEP LPE writeup Part #1 :) twitter.com/Nettitude_Labs…
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
& Stalmans
@_staaldraad
|
24. stu |
|
New write-up:
Command injection is usually mitigated but argument injection is often overlooked.
An example of an argument injection chain leading to code execution: staaldraad.github.io/post/2019-11-2…
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
Ori Damari
@0xrepnz
|
13. stu |
|
Everyone knows Driver Signature Enforcement.... 🙃
The problem is: Attackers can load any signed driver and abuse its functionality. For example, the process hacker driver can be abused to dump the memory of lsass.exe.
Read about it in my blog😋
repnz.github.io/posts/abusing-… pic.twitter.com/FjQ5fC4vdE
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
Chris
@brompwnie
|
27. ruj |
|
Super stoked that @uchi_mata,@_staaldraad and myself will be sharing some cloud pwnage this year at @BlackHatEvents London with our talk "Reverse Engineering and Exploiting Builds in the Cloud"! blackhat.com/eu-19/briefing…
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
Ѻṧαη∂α ☣ ☠ ☢
@OsandaMalith
|
9. ruj |
|
MiniDumpWriteDump via Faultrep!CreateMinidump osandamalith.com/2019/09/08/min… via @OsandaMalith
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
Ѻṧαη∂α ☣ ☠ ☢
@OsandaMalith
|
27. kol |
|
Running Shellcode Directly in C osandamalith.com/2019/08/27/run… via @OsandaMalith
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
Ѻṧαη∂α ☣ ☠ ☢
@OsandaMalith
|
26. kol |
|
Converting an EXE to a DLL osandamalith.com/2019/08/26/con… via @OsandaMalith
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
A. Hacker
@armitagehacker
|
21. kol |
|
Cobalt Strike’s Process Injection: The Details blog.cobaltstrike.com/2019/08/21/cob…
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
Chris
@brompwnie
|
26. srp |
|
Containers in the cloud are fun,breaking out of them is even more fun,I'll be sharing BOtB's new features @BlackHatEvents @ToolsWatch Arsenal session on Wednesday(7th) and giving a talk version @defcon @cloudvillage_dc on Saturday (10th),come say hi and chat container pwnage!
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
MDSec
@MDSecLabs
|
22. srp |
|
Introducing the Office 365 Attack Toolkit, a new blog post and tool release by @0x09AL mdsec.co.uk/2019/07/introd…
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
& Stalmans
@_staaldraad
|
16. srp |
|
CVE-2019-13139 ; command injection in `docker build`: staaldraad.github.io/post/2019-07-1… pic.twitter.com/rFpNCAZD2o
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
& Stalmans
@_staaldraad
|
11. srp |
|
New blog post up!
Bypassing a Docker AuthZ plugin and using docker-containerd for privesc.
staaldraad.github.io/post/2019-07-1…
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
b33f
@FuzzySec
|
6. lip |
|
I have released Fermion, an electron application for @fridadotre with integrated Monaco code editor. Check out the repo here => github.com/FuzzySecurity/… you can also download a pre-built release package for x64 Windows ❤️💀 pic.twitter.com/y0JRyprCc9
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
Chris
@brompwnie
|
5. lip |
|
Thanks @BSidesLondon for letting me ramble about "Build to hack, hack to build", that was a lot of fun :) BOtB can be found here -> github.com/brompwnie/botb
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
Dimitris Glynos
@dfunc
|
31. svi |
|
A blog post by @_argp on his research on the "com.apple.security.sandbox" component, as presented at CanSecWest 2019 census-labs.com/news/2019/04/1…
|
||
|
|
||
| Evangelos proslijedio/la je tweet | ||
|
JaviDR
@_javiDR_
|
15. svi |
|
Im pleased to announce i will be speaking @ B-Sides London rookie track bsideslondon2019.sched.com/event/P6ea/aut…
|
||
|
|
||
|
Evangelos
@lex0tanil
|
10. svi |
|
congratulazioni dude!
|
||
|
|
||