Twitter
Evading AV: Using OWASP-ZSC to Create Payloads that are Undetectable
infosechttps  evadingAV  cybersecurity  from twitter_favs
21 hours ago
t.co / Twitter
Evading AV: Using OWASP-ZSC to Create Payloads that are Undetectable
infosechttps  evadingAV  cybersecurity  from twitter_favs
21 hours ago
Twitter
RT : Riding out DOMsday: Toward Detecting and Preventing Cross-Site Scripting < weekend rea…
DOM  from twitter
yesterday
Untitled (http://www.cs.cmu.edu/~anupamd/paper/ndss2018.pdf)
RT : Riding out DOMsday: Toward Detecting and Preventing Cross-Site Scripting < weekend rea…
DOM  from twitter
yesterday
Twitter
Now that Shellter Pro v3.0 has been officially released it's time to think about our next donation to a good cause.…
from twitter_favs
yesterday
Twitter
Here's my WAF that I am working on!
It won't actually block you attacks. It will just say "Attack Detected"
So If y…
from twitter_favs
yesterday
Twitter
The best graph you are likely to see this week.
from twitter_favs
2 days ago
FinSpy VM Unpacking Tutorial Part 3: Devirtualization — Möbius Strip Reverse Engineering
RT : New blog entry: FinSpy VM Unpacking Part 3 of 3: Devirtualizing FinSpy VM Programs
from twitter
3 days ago
Untitled (https://leanpub.com/xss)
RT : A lot of things you might need for is here. If you didn't download it yet, here's a friendly reminder!
XSS  from twitter_favs
4 days ago
Twitter
RT : Crafted this payload for quick tests.
Its equipped with multiple filter bypass methods.
I will upload a context bre…
from twitter_favs
4 days ago
Twitter
RT : RT : Remote Code Execution in IDA by double clicking a string. Protocol handler abuse.…
from twitter
4 days ago
Discovering issues in HTTP/2 with Chaos Testing
Discovering Issues with HTTP/2 via Chaos Testing
from twitter
4 days ago
(429) https://twitter.com/i/web/status/966175714302144514
Here's the context breaking payload equipped with some tricks.
-->'"/></sCript><svG x=">" onload=(co\u006efirm)``>…
from twitter_favs
4 days ago
Twitter
RT : Introducing a new tool I've been working on: elf-strings!

elf-strings will read an ELF binary's string sections wi…
from twitter_favs
4 days ago
GitHub - blackzert/aslur
RT : Linux ASLR and GNU Libc: Address space layout computing and defense, and “stack canary” protection bypass
from twitter
4 days ago
Twitter
RT : Super cool – reliable static binary rewriting via superset disassembly. Key idea: disassemble at *every* possible o…
from twitter
4 days ago
Twitter
Cool, never knew that the self-synchronizing property of x86 was because of something that had a name
from twitter_favs
4 days ago
Twitter
RT : Google Discloses Microsoft Edge Security Feature Bypass
from twitter
5 days ago
Twitter
RT : Striker : An offensive information and vulnerability scanner :
from twitter
5 days ago
GitHub - zricethezav/gitleaks: Searches full repo history for secrets and keys 🔑
RT : gitleaks : Searches full repo history for secrets and keys (faster than trufflehog)
from twitter
5 days ago
Twitter
RT : gitleaks : Searches full repo history for secrets and keys (faster than trufflehog)
from twitter
5 days ago
Twitter
Cloak : Backdoor any python script with some tricks : cc
from twitter_favs
5 days ago
(429) https://twitter.com/reconbrx/status/963136543031545856
RT : My slides on Reverse Engineering Windows Defender's JavaScript Engine are now online:
from twitter
5 days ago
Twitter
Building A Concurrent Web Scraper With Python and Selenium >>
Python  Selenium  from twitter_favs
6 days ago
Bypasss User-Mode Hooks
RT : Rewriting ntdll functions to bypass simple user-mode hooks (antidebug)
windows  from twitter
6 days ago
Twitter
RT : Rewriting ntdll functions to bypass simple user-mode hooks (antidebug)
windows  from twitter
6 days ago
Twitter
Apparently someone had already some fun with Shellter Pro v3.0 :)
from twitter_favs
6 days ago
Twitter
Na mais nova experiência da minha vida (tirar fotografias tipo passe) passou hoje de manhã no meu humilde estabele…
from twitter_favs
7 days ago
Twitter
Digging passwords in Linux swap : , swap_digger : automates swap extraction and searches fo…
from twitter_favs
7 days ago
Digging passwords in Linux swap - Sevagas
Digging passwords in Linux swap : , swap_digger : automates swap extraction and searches fo…
from twitter_favs
7 days ago
Twitter
RT : A fucking huge mine for pentesters. It also will help you for the OSCP and OSCE ! Thanks for the owner of this 🙏🙏🙏…
from twitter
7 days ago
Satoshi's note: AMSI Bypass With a Null Character
RT : blogged about bland new AMSI bypass fixed this week.
from twitter
7 days ago
Twitter
RT : 😳😳 whaaat!? Someone wrote a 3D Engine made of Excel formulas
from twitter
7 days ago
Twitter
Code execution is all the rage these days, but can your Switch do *this*? ;-)
switchnix  from twitter_favs
8 days ago
Twitter
RT : Stealing Data With CSS : Attack and Defense :
from twitter
8 days ago
Twitter
RT : How to Create a Compiler (Part 1/6) — Converting text into an Abstract Syntax Tree : , Part…
from twitter
9 days ago
Untitled (https://www.youtube.com/watch?v=eF9qWbuQLuw)
RT : How to Create a Compiler (Part 1/6) — Converting text into an Abstract Syntax Tree : , Part…
from twitter
9 days ago
An opinionated guide to Haskell in 2018
Great post: An opinionated guide to Haskell in 2018.
from twitter_favs
10 days ago
Twitter
Parat - Python Based Remote Administration Tool (RAT)
Backdoor  FUD  Linux  from twitter_favs
10 days ago
Twitter
Retrogaming Memory! ❤

Title: Indiana Jones & the Last Crusade: Graphic Adventure
Publisher: Lucasfilm Games
Platfo…
from twitter_favs
10 days ago
Twitter
memrepl is a frida based script that aims to help a researcher in the task of exploitation of memory corruption rel…
from twitter_favs
10 days ago
Twitter
"Cyclists should wear high visibility clothing which helps other road users to see you." A lorry driver hit *this*…
from twitter_favs
11 days ago
Untitled (https://www.youtube.com/watch?v=1PAGcPJFwbE)
RT : Introduction to Memory Forensics : ,Introduction to Windows Forensics :…
from twitter
11 days ago
Twitter
RT : Introduction to Memory Forensics : ,Introduction to Windows Forensics :…
from twitter
11 days ago
GitHub - Eitenne/Hacking-books
Hacking Books & Cheatsheets : (Pl. buy legitimate paperbooks / pdf instead of using Pirated one's* )
from twitter_favs
11 days ago
Twitter
Hi. EICAR fits in the username field of an ssh connection. Then sshd prints the whole username into auth.log.
from twitter_favs
11 days ago
Twitter
Mi hermano 😊 has one of the best visualizations ever! 🙌🙌
DFIR  from twitter_favs
12 days ago
Twitter
RT : 0-day vulnerability in Telegram exploited to launch multipurpose attacks :
from twitter
12 days ago
Zero-day vulnerability in Telegram - Securelist
RT : 0-day vulnerability in Telegram exploited to launch multipurpose attacks :
from twitter
12 days ago
Twitter
It’s math.

It’s art.

It’s Fourier transform.

Brilliant:

via
mathematics  SciArt  from twitter_favs
13 days ago
GitHub - nahamsec/JSParser
Recon scripts
InputScanner

JSParser

JS-Scan…
from twitter_favs
14 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 159460 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade beroot bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost blueteam bluetooth bm book books boot boot2root bootkit bro_ids browser browsers brucon bruteforce bruteforcer bsideschallenge bsideslisbon bsideslondon bugbounty burp bypass campc canvas capstone capstoneinside captcha capture centos charliehebdo chart cheatsheet checkitout checklist chisel chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf confoo connections crack crackme crawler cronjob crossplatformdisassembler crosssitescripting crowbar crypto cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber cyber_warfare cybercrime cybersecurity dahboo7 dailywtf data dataexfiltrationtoolkit datascience db dbgkit dc4420 deal deals debugger debugging decompiler deeplearning defcon defense derbycon design det detection dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dl dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption equationgroup erlang escalating ettercap event exploit exploitation exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny future fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git github gnome gnu golang google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackerone hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitb2017ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec infrastructure injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan jaff java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kekeo kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning macos macosx mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking neutrinobot news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pe penetrationtest pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy privilegeescalation processexplorer productivity programming proxy pshitt pwn2own python qt quotes ransomware raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remcos remwa repy2exe retrogaming reverse reverse_engineering reverseengineering reversing rkt rodeoide root rop ror rowhammer ruby ructfe samba sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shadowbrokers shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source sp17 space splunk sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tbt tech terminal testbed thn threat threathunting tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 uefi ui unix url usa usb usenix vault7 video videos vietnam virginia virtualization viz vm voip volatility vpn vulnerability vulnhub waf wearables web web-dev web2py webapp webdev websec websecurity webvulscan wii wikileaks win windbg windows windows8 wordpress worldphotographyday wpa wpscan writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: