8316
showing only twitter [see all]
Twitter
RT : Part 3 in a series of posts about the Binary Ninja Intermediate Language (BNIL) family. Thanks and…
from twitter
yesterday
Exploring PowerShell AMSI and Logging Evasion – MDSec
RT : New blog post on Exploring PowerShell AMSI and Logging evasion by
from twitter
yesterday
Twitter
RT : Added a few PHP extensions from default configurations to my notes -
I'm pretty surprised b…
from twitter
2 days ago
Notes - gynvael.coldwind//vx
RT : Added a few PHP extensions from default configurations to my notes -
I'm pretty surprised b…
from twitter
2 days ago
Twitter
RT : Updated the RDP module to support all latest Windows versions and the more complicated version 5 of remote…
Ncrack  from twitter
2 days ago
GitHub - nccgroup/house: A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
RT : house - A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
from twitter
2 days ago
Twitter
RT : Here's a 3rd-party utility that disables a number of risky Windows features, including Windows Script Host, AutoRun…
from twitter
4 days ago
GnuPG Flaw in Encryption Tools Lets Attackers Spoof Anyone's Signature
RT : GnuPG Flaw in Encryption Tools Lets Attackers Spoof Anyone's Signature
from twitter
4 days ago
Let's code a TCP/IP stack, 1: Ethernet & ARP
RT : Let's code a TCP/IP stack, Part 1: Ethernet & ARP : , Part 2 : IPv4 & ICMPv4 :…
from twitter
4 days ago
Twitter
RT : Let's code a TCP/IP stack, Part 1: Ethernet & ARP : , Part 2 : IPv4 & ICMPv4 :…
from twitter
4 days ago
1544 - Windows: Child Process Restriction Mitigation Bypass - project-zero - Monorail
RT : Opened a bug in token handling (again) which allows bypassing the Child Process Restriction policy in Edge etc.
from twitter
6 days ago
Twitter
RT : SoK: Systematic overview of C++ sanitizers w emphasis on sec issues [tools viz sec vul coverage, performance, compa…
from twitter
6 days ago
Twitter
RT : New method of Code Execution on Windows 10.

1. .SettingContent-ms filetype.
2. Set <DeepLink> to path of the bina…
from twitter
7 days ago
Twitter
RT : Just tested r2dec on a PoC. Works very nicely :) More to come at
radare2  Spectre  from twitter
7 days ago
Twitter
RT : After months of hard work has published as a guest author in our blog, her in-depth article on Graphene…
from twitter
8 days ago
Twitter
RT : What if your incident runbooks were executable? Nurtch is based on the Jupyter Notebook format, and lets you pull i…
from twitter
8 days ago
Twitter
RT : Finally reached 10k subs on my English YT channel! :)

Thank you for your trust! (though ser…
from twitter
8 days ago
GynvaelEN - YouTube
RT : Finally reached 10k subs on my English YT channel! :)

Thank you for your trust! (though ser…
from twitter
8 days ago
Twitter
RT : A great summary of the recent various ZIP implementation path traversal review. I love how it includes e.g…
from twitter
9 days ago
Exploitation Archives - rootkit
RT : RT : Nice post series about Windows Kernel exploitation
from twitter
9 days ago
Twitter
RT : binary rewriter - a static binary rewriter for x86 ELF binaries (part of xom-switch). xom-switch is the eXecutable-…
from twitter
9 days ago
Twitter
RT : Leaf-Node weakness in Bitcoin Merkle Tree Design
from twitter
10 days ago
Twitter
RT : UAC Bypassing Using msdt.exe XML/Execution Via Feature in Msdt
- & RawLog

- & Video UAC-By…
from twitter
10 days ago
UAC-bypass.log · GitHub
RT : UAC Bypassing Using msdt.exe XML/Execution Via Feature in Msdt
- & RawLog

- & Video UAC-By…
from twitter
10 days ago
RDPClip
RT : 2 minute read on rdpclip and capturing clipboard content across RDP sessions.
from twitter
10 days ago
Twitter
I stopped going but I remember over the last 3 years having seen loads of…
from twitter
10 days ago
Twitter
RT : If you weren’t able to attend the session or watch it live, you can now watch “Your Apps and the Future of macOS Se…
from twitter
11 days ago
Twitter
RT : Something like linux-insides but for ARM, great reading - Learning operating system development using
Linux  from twitter
11 days ago
GitHub - panda-re/lava: LAVA: Large-scale Automated Vulnerability Addition
RT : Happy Friday! As promised, the source code for LAVA is now up on GitHub!
from twitter
11 days ago
The Seven Properties of Highly Secure Devices - Microsoft Research
RT : The Seven Properties of Highly Secure Devices - Microsoft Research
from twitter
11 days ago
Twitter
RT : sslmerge : an open source tool to help you build a valid SSL certificate chain or fix the incomplete. Also download…
from twitter
11 days ago
PDFiD: GoToE and GoToR Detection (“NTLM Credential Theft”) | Didier Stevens
RT : PDFiD: GoToE and GoToR Detection (“NTLM Credential Theft”) : , NTLM Credentials Theft via P…
from twitter
11 days ago
Twitter
RT : PDFiD: GoToE and GoToR Detection (“NTLM Credential Theft”) : , NTLM Credentials Theft via P…
from twitter
11 days ago
Twitter
RT : We published new research about Supermicro firmware, where we discovered issues with firmware storage and update au…
from twitter
12 days ago
Twitter
RT : distiller - A distributed corpus distillation tool for windows applications. Essentially a rewrite of Ben Nagy and…
from twitter
12 days ago
Twitter
RT : Blogpost about some new KRACK attack results, and our extension to the WiFi standard to prevent multi-channel man-i…
from twitter
12 days ago
GitHub - square/sudo_pair: Plugin for sudo that requires another human to approve and monitor privileged sudo sessions
Sudo_pair - Plugin for sudo that requires another human to approve and monitor privileged sudo sessions
from twitter
12 days ago
Twitter
RT : 1-day exploit development for Cisco IOS

- just brilliant, nothing to add; except thanks for sharing

infosec  from twitter
14 days ago
Twitter
RT : My talk on fuzzing is now available! If you want to get started with fuzzing you should check it out! You…
from twitter
14 days ago
Luna
RT : Luna - A WYSIWYG language for data processing
from twitter
14 days ago
Twitter
RT : wtf : A personal information dashboard for your terminal :
from twitter
16 days ago
Twitter
RT : RT : Here is my write-up of the new Git RCE vulnerability.
Covers the process of discovery, stumbling,…
from twitter
16 days ago
Twitter
RT : I've released a new blog post about adding a CommandLine property to 's Get-Process cmdlet. Just for fun…
PowerShell  from twitter
17 days ago
Twitter
RT : Interactive Shell via BlueTooth : cc
from twitter
17 days ago
GitHub - P3GLEG/PwnBack: Burp Extender plugin that generates a sitemap of a website using Wayback Machine
RT : PwnBack Burp Extender plugin that generates a sitemap of a website using Wayback Machine.
from twitter
17 days ago
Twitter
RT : PoC script for various methods to acheive authenticated remote code execution via WMI, without (at least directly)…
from twitter
17 days ago
Twitter
RT : PowerShell: In-Memory Injection Using CertUtil.exe | by
from twitter
18 days ago
« earlier      
#blog #fr #hacking #homepage #js #security 00 01 02 03 05 06 0day 159460 2009 31c3 32c3 44con academic activedirectory adfsl ai alabama analysis androguard android anonym8 anonymous antisandbox antisec apple apps appsec architecture arm arp arpy art ashley aslr asm audit auditingtool awesome aws b2b backdoor backdoors backtrack backup bash belgrade beroot bheu bhusa bigdata binwalk birmingham bitlocker bittorrent blackhat blackhateu blackhole blind_sqli blog blogpost blueteam bluetooth bm book books boot boot2root bootkit bro_ids browser browsers brucon bruteforce bruteforcer bsideschallenge bsideslisbon bsideslondon bugbounty burp bypass campc canvas capstone capstoneinside captcha capture centos charliehebdo chart cheatsheet checkitout checklist chisel chrome cisco ciscotalos civ climber cloud cms cocoa code codebits codebits2011 codetainer coding colorado comedy comic conf confoo connections crack crackme crawler cronjob crossplatformdisassembler crosssitescripting crowbar crypto cryptohaven cryptoparty cryptowall csp csrf css ctf cuckoo curiosity cyber cyber_warfare cybercrime cybersecurity dahboo7 dailywtf data dataexfiltrationtoolkit datascience db dbgkit dc4420 deal deals debugger debugging decompiler deeplearning defcon defense derbycon design det detection dev devel devops dfir dfirsummit dfrws dirtycow disassembler discover diy dl dll dns doc docker dockersecurity dominator dos dropbox duqu earth eclipse elasticsearch electronics elf elixirlang emacs emet empire encryption equationgroup erlang escalating ettercap event exploit exploitation exploitkit fail fb firefox flame forensic forensics foss fr framework free freebsd fridayreads fun funny future fuzzer fuzzing game gamedev games gaming gdb geek geographyofpoverty git github gnome gnu golang google googleplay graph graphs grrcon gtd gui hack hack2learn hacker hackerone hackers hackersonlineclub hacking hackingteam hacklu hackpra hardening hardware hash hashcat heartbleed hitb2016ams hitb2017ams hitbgsec homepage honeypot howto html html5 https humor hunter icloud icon icons ida ids ie ie6 ie9 infosec infrastructure injection ioc ios iphone ipv6 ipython iso it italy itsec j2ee j2eescan jaff java javaone javascript jesuischarlie jobs jquery js jsrat jvm kali kalilinux katoolin kekeo kernel keylogger kibana lab learn leopard lfi libsigrokdecode links linux live locky lowpower lynis mac macbook machinelearning macos macosx mail maltego malware malwareanalysis malwaremustdie manager manual map math mbr metasploit microsoft mimikatz mitm mobile model modeling money monitoring moon movies movp mq msf mysql nasa neo4j netbook netsec network networking neutrinobot news nginx nginxday nmap nodejs noriben notsosecure nsa nsm ntp numpy ohm2013 oldschool oldschoolbackdoors oleoutlook ollydbg opensource openssl oprahssl oracle os oss osx owasp pacsec pandas paper password patch pdf pe penetrationtest pentest pentesters pentesting pentestlab perceptual persistence personal pestudio pgp phishing php pki plot poc poc2014 portable portugal postgresql powershell privacy privilegeescalation processexplorer productivity programming proxy pshitt pwn2own python qt quotes ransomware raspberrypi raspberrypi2 rce re realtime recipes recon14 reconmtl regex rehints rekall remcos remwa repy2exe retrogaming reverse reverse_engineering reverseengineering reversing rkt rodeoide root rop ror rowhammer ruby ructfe samba sandbox sans sanspentestblog scada scanner screencast screencasts sdo search sec14 security securitymanager seo serbia shadowbrokers shellcode shellcoding shellter slides sniffer snippet snmp snowleopard social software source sp17 space splunk sqli sqlilab sqlinjection ss7map ssh ssl starttls startups stat stats stuxnet sun suricata svg sync sysadmin syslog tbt tech terminal testbed thn threat threathunting tip tips tool tools toolswatch tor tr16 tricks trojan truestory tutorial tv tweak ubuntu ue4 uefi ui unix url usa usb usenix vault7 video videos vietnam virginia virtualization viz vm voip volatility vpn vulnerability vulnhub waf wearables web web-dev web2py webapp webdev websec websecurity webvulscan wii wikileaks win windbg windows windows8 wordpress worldphotographyday wpa wpscan writeup wxpython x64dbg xslt xss xxe yara zeronighs zeronights

Copy this bookmark:



description:


tags: