Twitter | Pretraživanje | |
James Forshaw
New blog post outlining how to use my .NET RPC Client tooling from PowerShell and C# to test and exploit local RPC security vulnerabilities. Also an early xmas present for those who enjoy long standing design flaws in UAC :-)
Reply Retweet Označi sa "sviđa mi se" More
Acebond 18. pro
Odgovor korisniku/ci @tiraniddo
Its never a boring day when releases a blog post. Awesome work man, and the tooling will be invaluable for Windows exploit research / PoC development.
Reply Retweet Označi sa "sviđa mi se"