Twitter | Pretraživanje | |
Rob
4.239
Tweetovi
309
Pratim
1.650
Osobe koje vas prate
Tweetovi
Rob proslijedio/la je tweet
Dave dwizzzle Weston 5. velj
Just posted my talk "Keeping Windows Secure" touching on security assurance process and vuln research in Windows from 2019:
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Leandro Barragan 28. sij
[Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
GitHub Security Lab 28. sij
Check out ' tips on Fuzzing, to overcome known challenges and maximize results:
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Marcello 27. sij
Just pushed a somewhat big update to SILENTTRINITY with a lot of forward compatibility fixes for Python 3.8 and made the PowerShell "stageless" stager public. Plus more modules and bug fixes
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
SpecterOps 22. sij
Odgovor korisniku/ci @SpecterOps
Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Steven 22. sij
Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Responder 9. sij
Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Samuel Groß 9. sij
I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Ryan Cobb 27. pro
SharpSploit v1.5 is out! Includes amazing work from , , , , and . Includes: lateral movement over SCM and PSRemoting, an AMSI bypass, CreateProcessWithToken, and DynamicInvoke improvements. 🔥🔥🔥
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Andrea Fioraldi 24. pro
New XMas release of frida-fuzzer: 1.2 🎉 A release with Android fuzzing in mind. Moar speed for remote (e.g. with adb) and ARM fuzzing and support to dictionaries.
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
h0mbre 21. pro
Last project of 2019. I created an image-based C2 channel proof of concept that posts/retrieves stego'd images on Imgur. As a PoC only, I've simulated a proper implant in Python. The Framework is called Dali, after the artist. For fun & to learn!
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Cutter 20. pro
Cutter v1.10 now has a DEBUGGER! 🐞🥳 After a lot of work, we are so happy to announce that we finally implemented your most requested feature. The beta version of the debugger is available NOW on our website >> List of features and what's coming next >>
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Ivan Fratric 16. pro
A nice write-up on WinAFL setup for fuzzing popular image viewers resulting in quite a few bugs.
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Andrea Fioraldi 14. pro
I repropose my notes about x86, Linux and virtualization in a single text file (~2500 lines only) for my fellow students in Sapienza.
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Kevin Backhouse 12. pro
First blog post in a short series about some vulnerabilities that I found in Ubuntu's crash reporter earlier this year. I learned a lot from working on the exploits, so I am going to share some of the tips and tricks that I learned.
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Jackson T. 11. pro
Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Andrea Fioraldi 12. pro
Good news! Stalker is now ready for fuzzing and my frida-fuzzer is ready to fuzz APIs of Android apps. With a logic inspired by AFL, it has a libFuzzer-like harness interface. The project is in his early stage, look at the TODOs to contribute.
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
Axel Souchet 6. pro
Here is an exploit chain I wrote for Firefox that gets RCE via CVE-2019-9810 and escape the sandbox with CVE-2019-11708/CVE-2019-9810. Once compromised, it drops a payload and injects privileged JS code in already/newly created tabs.
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
StalkR 7. pro
The Gomium Browser - Exploits different approaches including an unexpected Go compiler bug, well done & others!
Reply Retweet Označi sa "sviđa mi se"
Rob proslijedio/la je tweet
SensePost 29. stu
What , & spent their SenseCon doing - hacking Doom. From dynamic hooking to static patching all with Frida.
Reply Retweet Označi sa "sviđa mi se"