ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು
- ಟ್ವೀಟ್ಗಳು & ಪ್ರತಿಕ್ರಿಯೆಗಳು
- ಮಾಧ್ಯಮ
@r00tbsd ತಡೆಹಿಡಿಯಲಾಗಿದೆ
ನೀವು ಖಚಿತವಾಗಿಯೂ ಈ ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡಲು ಬಯಸುವಿರಾ? ಟ್ವೀಟ್ಗಳನ್ನು ನೋಡುವುದು @r00tbsd ಅವರನ್ನು ತಡೆತೆರವುಗೊಳಿಸುವುದಿಲ್ಲ.
-
Defenders, new logging in Win10 to help detect credential dumping and enumeration.
#mimikatz https://technet.microsoft.com/en-us/library/mt431757(v=vs.85).aspx#BKMK_LSASS …pic.twitter.com/GO1qyrVawX
-
-
Forget unsigned code. Do you know what signed code exists on your host? I felt kind of dirty after running this.https://gist.github.com/mattifestation/0616fa734be7ae4b77d6e347229bec6a …
-
Here's a Python script that uses Hamming distance to guess the XOR key size & ngrams to extract encoded PE files https://bitbucket.org/snippets/Alexander_Hanel/94p4R …
-
After allot of hard work MS16-098 Microsoft RNGOBJ Integer Overflow full exploit win 8.1 x64pic.twitter.com/yS02rRXj6s
-
Caradoc v0.3 released, lots of new features for PDFs https://github.com/ANSSI-FR/caradoc … More on my blog https://gendignoux.com/blog/2016/12/23/caradoc-version-0-3.html …
-
End-of-year message from CIRCL https://www.circl.lu/pub/press/20161223/ … Thank you all very much!
-
SAMRi10 : a Microsoft-supported PowerShell script for changing default permissions on SAM https://gallery.technet.microsoft.com/SAMRi10-Hardening-Remote-48d94b5b … CC
@gentilkiwi -
Already detected 2 malicious PE files with a ‘/‘ in the filename. The goal is to try to break analysis on sandboxes/tools running on *NIX?
-
JSDropper continue to spread ursnif (Target: Italy, ~800 infections in 24h). https://www.virustotal.com/fr/file/3988de226010e1f234b223b3f001b4aabb08644b72042f8260d0c3eebb5b1ff1/analysis/1482229323/ … https://otx.alienvault.com/pulse/5851b5d287d2d95d361dd743/ …pic.twitter.com/QVAEQdbfyG
-
An implementation of a generic unpacker based on Intel PINhttps://github.com/PinDemonium/PinDemonium …
-
Detailed description/analysis by
@hackerfantastic of the NSA 0-days and malware published this week. https://www.myhackerhouse.com/merry-haxmas-shadowbrokers-strike-again/ … -
Most fun exploit I ever wrote: [0day] [exploit] Redux: compromising Linux using SNES Ricoh 5A22 processor opcodes?! https://goo.gl/bwNwm2
-
Happy Monday: an IDA plugin to show a function's summary (calls, strings) as hover hints. https://gist.github.com/williballenthin/eeea2093888e8d4004ec06b5a1dede1e …pic.twitter.com/2mzeyHXIVK
-
My slides for my talk on NextGen Office Malware are available at: https://github.com/glinares/OfficeMalware … Please enable Macros to view full content ;)
-
Unbelievable: There is an ancient tool in Windows 10, which wrap Powershell to exe!THX
@TobiasPSP in the Powershell UserGrp Hanover#PSUGHpic.twitter.com/JKUpraFVif
-
New in
#kekeo: s4u to make quick and dirty S4U2Self and S4U2Proxy in Windows https://github.com/gentilkiwi/kekeo/releases … Check your users attributes ;)pic.twitter.com/yP1G9UtN92
-
Paul Rascagnères ಹಿಂಬಾಲಿಸಿದ್ದಾರೆ ztormhouse, Only In Asia, StreetArt WTF ☜ RT ! and 7 others
-
-
@Crazyinnasia
Its just a normal day in Asia. Don't forget to check out
@CrazyinRussia. We are a FAN/ Parody*of the posts/videos and do not claim any ownership or copywrites.
-
-
@ericfreyss agreed. Pink suits you well & I guess@FredLB will be wearing yellow@udgover@g4l4drim@r00tbsd@vhinderer@_Reza__@Sebdraven
ಲೋಡಿಂಗ್ ಸಮಯ ಸ್ವಲ್ಪ ತೆಗೆದುಕೊಳ್ಳುತ್ತಿರುವಂತೆನಿಸುತ್ತದೆ.
Twitter ಸಾಮರ್ಥ್ಯ ಮೀರಿರಬಹುದು ಅಥವಾ ಕ್ಷಣಿಕವಾದ ತೊಂದರೆಯನ್ನು ಅನುಭವಿಸುತ್ತಿರಬಹುದು. ಮತ್ತೆ ಪ್ರಯತ್ನಿಸಿ ಅಥವಾ ಹೆಚ್ಚಿನ ಮಾಹಿತಿಗೆ Twitter ಸ್ಥಿತಿಗೆ ಭೇಟಿ ನೀಡಿ.
John Lambert
Paul Rascagnères
Matt Graeber
Alęxandęr Hanęl
0x5A1F
Guillaume Endignoux
CIRCL
newsoft
Benkow moʞuƎq
Borja Merino
Christopher Soghoian
Chris Evans
Willi Ballenthin
Greg Linares
Andreas Nick
Sebastien Tricaud

Benjamin Delpy
Saad Kadhi