Twitter
Digging passwords in Linux swap : , swap_digger : automates swap extraction and searches fo…
from twitter_favs
yesterday
Digging passwords in Linux swap - Sevagas
Digging passwords in Linux swap : , swap_digger : automates swap extraction and searches fo…
from twitter_favs
yesterday
Twitter
RT : Hi. EICAR fits in the username field of an ssh connection. Then sshd prints the whole username into auth.log.
from twitter_favs
3 days ago
Twitter
RT : RED TEAM/BLUE TEAM TIP: Most Windows deployment tutorials recommend hard-coding server or domain (admin) credential…
from twitter_favs
6 days ago
Twitter
RT : Need some help on how to do recon? and I created "A Visual Guide to Recon" for hackers and bug bounty hunter…
from twitter_favs
6 days ago
Twitter
RT : BitGrail lost $170 million worth of Nano XRB tokens because... the checks for whether you had a sufficient balance…
from twitter
8 days ago
Twitter
RT : When a vfat thumbdrive which contains `` or $() in its volume label is plugged and mounted trough the device notifi…
from twitter
8 days ago
Getting SYSTEM – Decoder's Blog
RT : Getting System by exploiting the parent process (powershell)
from twitter
12 days ago
Twitter
RT : A little update to dump NTLM password history from local SAM database (online/offline)…
mimikatz  from twitter
14 days ago
GitHub - Neo23x0/APTSimulator: A toolset to make a system look as if it was the victim of an APT attack
APT Simulator
A toolset to make a system look as if it was the victim of an APT attack

> qu…
from twitter_favs
16 days ago
Twitter
APT Simulator
A toolset to make a system look as if it was the victim of an APT attack

> qu…
from twitter_favs
16 days ago
Twitter
RT : I made a thing. If you're in the habit of trying to find where AD admins have made security mistakes configuring Gr…
from twitter
22 days ago
Twitter
Großartiger Platformer von / : Sam's Journey (2017)
from twitter
23 days ago
Twitter
RT : Latest 7zip has buffer overflows allowing code exec if a malicious shrinked .rar or .zip is opened. It's fixed in…
from twitter
26 days ago
Twitter
RT : Sherlock. script to quickly find missing software patches for local privilege escalation vulnerabilitie…
PowerShell  from twitter
4 weeks ago
Twitter
RT : Meltdown & Spectre vulnerability checker written in assembly :
from twitter
4 weeks ago
GRC | InSpectre
RT : Meltdown & Spectre vulnerability checker written in assembly :
from twitter
4 weeks ago
(429) https://twitter.com/i/web/status/951464739313463296
RT : Intel performance results (fully mitigated vs. non mitigated systems): dropping performance up to 10% for web brows…
from twitter
5 weeks ago
Tails - Tails 3.4 is out
RT : Tails 3.4 is out: with the fix for Meltdown and partial mitigation for Spectre, among other security fixes.
from twitter
5 weeks ago
Twitter
RT : 2018 is starting out great for PCIe DMA attacking! 150MB/s+ memory dumps with the PCIeScreamer FPGA board!
from twitter
5 weeks ago
Handling of CPU bugs disclosure 'incredibly bad': OpenBSD's de Raadt
RT : Handling of CPU bugs disclosure 'incredibly bad': OpenBSD's de Raadt
from twitter
5 weeks ago
Twitter
RT : Which are the main differences between and ? looks into the critical processor vulnerabili…
Spectre  ENISA  Meltdown  from twitter
5 weeks ago
Twitter
RT : Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerB…
from twitter
9 weeks ago
Twitter
RT : glogg
multi-platform GUI application to browse & search through long or complex log files
via
from twitter
10 weeks ago
Securing Privileged Access Reference Material | Microsoft Docs
RT : Overview Windows logons - when do reusable credentials remain on destination systems?
from twitter_favs
10 weeks ago
Twitter
RT : Overview Windows logons - when do reusable credentials remain on destination systems?
from twitter_favs
10 weeks ago
Twitter
RT : I put together a Linux auditd configuration from my own old standard configs & public sources
> feedback welcome…
from twitter_favs
10 weeks ago
Twitter
RT : Saw this announcement at Brussels airport. I think I saw it also in Blade Runner, or Total Recall.
from twitter
12 weeks ago
Twitter
Wir bei ARTE sind ja generell sehr aufgeschlossen gegenüber langen Formaten, die sich Zeit für das Publikum nehmen.…
from twitter_favs
november 2017
Twitter
RT : Really Awesome Windows Exploitation collection!

infosec  pentest  from twitter
october 2017
Twitter
RT : SIEM use cases development workflow – Agile all the things!
by
from twitter
october 2017
Twitter
RT : Great! Vision2
Nmap's XML in, CVE Links out 😎

pentest  infosec  from twitter
october 2017
Twitter
RT : I built an advanced "has my yahoo e-mail account been breached?" script. Should send to I think. Ve…
from twitter
october 2017
Keybase launches encrypted git
RT : Keybase announcement right now: End-to-end encrypted Git!
from twitter
october 2017
Twitter
RT : Keybase announcement right now: End-to-end encrypted Git!
from twitter
october 2017
Tales of a Threat Hunter 1
RT : Detecting Mimikatz & other Suspicious LSASS Access - Part 1 | by Diego Perez
from twitter
september 2017
Twitter
RT : "Using RDP with a domain admin account is REALLY dangerous."
DFIRSummit  from twitter
july 2017
Twitter
RT : Very creepy , someone was apparently typing in an URL and WhatsApp was fetching it off my server char-by-c…
from twitter
june 2017
The Stack Clash – Network Security Blog | Qualys, Inc.
RT : The Stack Clash vulnerability in the memory management of Linux, OpenBSD, NetBSD, FreeBSD and Solaris, on i386/amd64
from twitter
june 2017
Twitter
RT : Detecting Lateral Movement through Tracking Event Logs - by (PDF)
Windows  DFIR  from twitter
june 2017
GitHub - SySS-Research/Seth: Perform a MitM attack and extract clear text credentials from RDP connections
RT : Seth : Perform a MitM attack extract clear text cred' from RDP connections : ,Attacking RDP:
from twitter
june 2017
« earlier      
175 ad adblocker admin algorithm analysis api architecture archive arm atm attackercommunity audit auditing av awesome bluehatil brute business bypass cheat cleartext collection concept credentials cryptolocker cyberprobe debian decrypt deobfuscation derivative design device devops dfir dfirsummit directory directx dma docx domain dump encryption esxi excel exploit extract flip force forensic forensics freiesoftware fsrm funny gateway go golang google gpo graylog guard hardening hash honeypot html htop identify inception incident infosec itsecurity keepass kernel laptop linux linux-kernel lisa16 local lynis malware mangle mcafee metasploit mikrotik mimikatz nagios nessus netsh nmap nut onion online openbsd openvpn os paper pass password payload pcap pdf pentest pf pivoting postexploitation powershell privesc processes programming pth ransomware raspberry rce rdp redteam reports routing runbook security seenabledelegationprivilege selfhosted selinux sheet siem skimmers snort ssh ssl stick sysmon teleconsole thunderbolt tool toolkit tools top tor trace tutorial uac unix updates ups usb usv validate vb visualbasic vmm vuln vulnerability wifi wiki windows word zeroday

Copy this bookmark:



description:


tags: