Twitter | Pretraživanje | |
Med K
Security guy, love reverse engineering, like to search and test new stuff
314
Tweetovi
745
Pratim
60
Osobe koje vas prate
Tweetovi
Med K proslijedio/la je tweet
Xentropy 1. velj
I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
FireF0X 2. velj
KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
reenz0h 31. sij
Reversing C++ executables with OOAnalyzer Ghidra Plugin
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
wrongbaud 31. sij
Hardware Debugging for Reverse Engineers Part 1: SWD, OpenOCD and Xbox One Controllers Hope you enjoy! As always ping me with any questions
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
Sami Laiho 31. sij
How to hack yourself admin rights on any Autopilot installed Windows 10 - aka The Return of the Shift+F10!
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
SwiftOnSecurity 15. lis
Have a vendor executable with unknown command-line options? Don’t want to reverse-engineer? Brute force in Windows shell! :: Extract strings from program strings.exe program.exe >> strings.txt :: Run each string as program argument for /f %a IN (strings.txt) DO “program.exe” %a
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
SwiftOnSecurity 15. lis
Odgovor korisniku/ci @SwiftOnSecurity
Among the undocumented flags in Windows Defender MpCmdRun.exe: -BuildSfc -ServiceHardening -SampleHeaderService -WriteLogsForSvc -WDEnable -ReloadEngine
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
Xavier Mertens🛡 29. sij
Forensic tools expect proper data in a proper way. So, modifying a USB stick... # hexedit /dev/sdb And change some bytes... What could go wrong? To create a loop of extended partitions and break those tools! Nice demo by Michael Hamm from
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
Jason 28. sij
It’s with great pleasure I'm (finally) releasing my docker images. Images are optimised for home and enterprise use. Some cleanup work to do (see issues), but its been in prod for months now. Github: DockerHub:
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
Red Canary 28. sij
From the folks that brought you Atomic Red Team, Chain Reactor is a new open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
SwiftOnSecurity 28. sij
I think I’ve discovered Win32 application launch history / usage trace data that appears undocumented by the community. It logs 3rd-party apps too. Win32kTraceLogging.AppInteractivitySummary See Microsoft’s “Diagnostic Data Viewer” app. A massive trove of data points
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
Nicolas Krassas 27. sij
Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
Pen Test Partners 5. sij 2018.
Ooh, here's with a grand how-to on bypassing code readout protection using JTAG, OpenOCD, gdb and 's CRP bypass on the Nordic nrf51822 Bluetooth SoC
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
Dino A. Dai Zovi 26. sij
The claim in the FTI forensics report on Bezos’ iPhone that, “due to end-to-end encryption employed by WhatsApp, it is virtually impossible to decrypt the contents of the downloader [.enc file]...” bugged me so much that I coded up how to do it:
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
gerhart 25. sij
Good whitepaper about windows 10 secure kernel: "Live forensics on the Windows 10 securekernel (2017)"
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
Minoru Kobayashi 24. sij
Hello, guys! Finally, I have released new 3 tools for and for macOS. Please try them and have a nice weekend :) 1st tool: Norimaci is malware analysis sandbox for macOS. This tool was inspired Noriben sandbox. (1/3)
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
Dimitrios Margaritis 24. sij
If you have ATP enable the NO-DEFAULT protections: 1)block office apps from creating child process and inject code to other process2)Block JS &VBS from launching downloaded executable content 3)Block credential stealing from lsass.exe and much more
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
Binni Shah 24. sij
TLDR pages : Simplified, community-driven man pages w/ examples : -->to quickly get access to community-driven cheat sheets. It has more than 60 programming languages and UNIX/Linux commands :
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
R136a1 24. sij
IOCs, the decompiled C# code with deobfuscated strings, a registry data config decrypter (for those who are infected) and some information of the Project TajMahal malware sample uploaded in 2019 to Virustotal:
Reply Retweet Označi sa "sviđa mi se"
Med K proslijedio/la je tweet
LP 23. sij
Odgovor korisniku/ci @jotunvillur
(Reversing malware challenges from Dennis Yurichev) (Malware Research Slack group from GelosSnake) (Basically all of Lenny Zeltser's blog) (Art of Memory Forensics - Volatility crew)
Reply Retweet Označi sa "sviđa mi se"