Fuzzing is magic - Or how I found a panic in Rust's regex library
RT : One more regex bug found by libFuzzer. This time in ... a Rust implementation!
from twitter
14 hours ago
TBOOX Open Source Project
RT : Trace objc method call for ios and mac
from twitter
yesterday
untitled - asciinema
RT : Native timeless debugging with radare2 is now available on git! /by
from twitter
4 days ago
Twitter
RT : How the heck do we get to main() in Linux x86? :
from twitter
4 days ago
Linux x86 Program Start Up
RT : How the heck do we get to main() in Linux x86? :
from twitter
4 days ago
Twitter
Im looking into this case now!

SMSS.EXE NOT working properly. It has two mothers.
from twitter_favs
4 days ago
Twitter
RT : Places of Interest in Stealing NetNTLM Hashes : cc
from twitter
5 days ago
CORS — a guided tour – Statuscode – Medium
CORS — a guided tour : Cross-origin resource sharing : cc
from twitter_favs
5 days ago
GitHub - GDSSecurity/xxe-recursive-download
xxe-recursive-download: Retrieve files from target server.Obtains dirlistings & recursively downloads file contents:
from twitter_favs
5 days ago
Twitter
Accessing others SmartCards in different sessions is fun(to sign Kerberos req in future😋) &
"RDP/S…
mimikatz  kekeo  from twitter_favs
5 days ago
Twitter
RT : Data Exfiltration via Blind OS Command Injection:
cybersecurity  tbt  hacking  infosec  from twitter
6 days ago
Twitter
Wikileaks document dump reveals how CIA has been hacking Apple devices for a decade
from twitter_favs
6 days ago
Twitter
: the new dev version of olemap can now detect and display extra data at the end of OLE files. cc…
oletools  from twitter_favs
6 days ago
(429) https://twitter.com/b1ack0wl/status/844947391560257536/photo/1
One of the most frustrating default settings ever. >:|
(Python 2.7 Installer for Windows)
from twitter_favs
7 days ago
JPCERT/CC Blog: Malware Clustering using impfuzzy and Network Analysis - impfuzzy for Neo4j -
RT : New Blog Post - Malware Clustering using impfuzzy and Network Analysis - impfuzzy for Neo4j - ^ST
from twitter
7 days ago
Twitter
Windows 10 v1607 --> INTEGER OVERFLOW fixed in "EngRealizeBrush" function --> win32kfull (v10.0.14393.594 VS 10.0.1…
from twitter_favs
7 days ago
Windows Kernel Shellcode on Windows 10 – Part 2 — Improsec
Windows Kernel Shellcode on Windows 10 (Part 4 ) : , Part 3 : , P2 :
from twitter_favs
8 days ago
Windows Kernel Shellcode on Windows 10 – Part 3 — Improsec
Windows Kernel Shellcode on Windows 10 (Part 4 ) : , Part 3 : , P2 :
from twitter_favs
8 days ago
Twitter
Intro to Sysmon analysis with WinDbg

Very interesting!
Sysmon is great! It's well integrated into WinDbg.
from twitter_favs
8 days ago
“Fileless” UAC Bypass using sdclt.exe | enigma0x3
Sigma rules for UAC bypass detection w/ Sysmon
>sdclt/eventvwr

rule…
from twitter_favs
9 days ago
Twitter
Sigma rules for UAC bypass detection w/ Sysmon
>sdclt/eventvwr

rule…
from twitter_favs
9 days ago
Twitter
RT : Attacking RDP - How to Eavesdrop on Poorly Secured RDP Connections : (pdf)
from twitter
9 days ago
Untitled (https://www.exploit-db.com/docs/41621.pdf)
RT : Attacking RDP - How to Eavesdrop on Poorly Secured RDP Connections : (pdf)
from twitter
9 days ago
Untitled (https://www.exploit-db.com/docs/40891.pdf)
Stego in TCP/IP made easy (Part-1): (pdf) ,Part 2 - The Phantom Shell : (pdf)
from twitter_favs
9 days ago
Untitled (https://www.exploit-db.com/docs/40897.pdf)
Stego in TCP/IP made easy (Part-1): (pdf) ,Part 2 - The Phantom Shell : (pdf)
from twitter_favs
9 days ago
RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…
“RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an…” by Kevin Beaumont
from twitter
9 days ago
Twitter
Ever used these strange Office URI's for phishing?

Very interesting to me. Give it a try.
from twitter_favs
10 days ago
Office URI Schemes
Ever used these strange Office URI's for phishing?

Very interesting to me. Give it a try.
from twitter_favs
10 days ago
GitHub - laike9m/pdir2: Pretty dir() printing with joy
pdir() vs dir() in Python. I think I'm in love. Thanks for the heads up: Covere…
from twitter_favs
10 days ago
Twitter
pdir() vs dir() in Python. I think I'm in love. Thanks for the heads up: Covere…
from twitter_favs
10 days ago
Twitter
SessionGopher – Session Extraction Tool
hack  hacking  from twitter_favs
10 days ago
Moodle – Remote Code Execution – 0-Days And Life
RT : CVE-2017-2641: Moodle Object Injection & SQLi causing Remote Code Execution
vulnerability  PHP  moodle  appsec  from twitter
10 days ago
Twitter
Handy for simulating data exfiltration tests via FTP if 's Egress-Assess () is…
from twitter_favs
10 days ago
Twitter
Stealing hashes over internet via regsvr32. Accidentally found this :)
NetNTLM  from twitter_favs
10 days ago
Scaling Consensus? This Turing Winner Thinks He's Found a Way
RT : Scaling Consensus? This Turing Winner Thinks He's Found a Way via +1
from twitter
11 days ago
Twitter
I sure do like the view from this office. We'll probably move when it gets covered by another building.
from twitter_favs
11 days ago
Untitled (https://www.youtube.com/watch?v=OgsoIoWmhWw&feature=youtu.be)
New technique: if you have SYSTEM rights, you can take over any RDP/RDS session without knowing their password
from twitter_favs
12 days ago
Twitter
RT : Encrypted models and ~predictions~ for deep learning, a new blog post from , written to be understood 👏…
from twitter
12 days ago
eBPF – IO Visor Project
eBPF – IO Visor Project - samples for Linux kernel probes
from twitter
13 days ago
Twitter
First team to pwn Safari on macOS with escalation to root at ! Was a ton of fun to pull that off with
pwn2own  from twitter_favs
14 days ago
Twitter
RT : WhatsApp, Telegram Flaw Allows Takeover for Millions of Accounts
Wearables  Cyber  from twitter
14 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost bluetooth bm book books boot boot2root bootkit browser brucon bruteforce bruteforcer bsideschallenge bsideslondon bugbounty burp bypass canvas capstone captcha capture centos charliehebdo chart cheatsheet checkitout checklist chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf crack crawler cronjob crossplatformdisassembler crosssitescripting cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber_warfare cybercrime cybersecurity dahboo7 dailywtf dataexfiltrationtoolkit db dbgkit dc4420 deal deals debugger decompiler defcon defense derbycon design det dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption erlang escalating ettercap event exploit exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git gnome gnu google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy processexplorer productivity programming proxy pshitt pwn2own python qt quotes raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remwa retrogaming reverse reverse_engineering reverseengineering reversing rodeoide root rop ror rowhammer ruby ructfe sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source space sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tech terminal testbed thn threat tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 ui unix url usa usb usenix video videos virginia virtualization viz vm voip volatility vpn vulnerability waf web web-dev web2py webapp webdev websec websecurity webvulscan wii win windbg windows windows8 wordpress worldphotographyday wpa writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: