Twitter
RT : Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerB…
from twitter
6 days ago
Twitter
RT : glogg
multi-platform GUI application to browse & search through long or complex log files
via
from twitter
11 days ago
Twitter
RT : Overview Windows logons - when do reusable credentials remain on destination systems?
from twitter_favs
12 days ago
Securing Privileged Access Reference Material | Microsoft Docs
RT : Overview Windows logons - when do reusable credentials remain on destination systems?
from twitter_favs
12 days ago
Twitter
RT : I put together a Linux auditd configuration from my own old standard configs & public sources
> feedback welcome…
from twitter_favs
12 days ago
Twitter
RT : Saw this announcement at Brussels airport. I think I saw it also in Blade Runner, or Total Recall.
from twitter
22 days ago
Twitter
Wir bei ARTE sind ja generell sehr aufgeschlossen gegenüber langen Formaten, die sich Zeit für das Publikum nehmen.…
from twitter_favs
5 weeks ago
Twitter
RT : Really Awesome Windows Exploitation collection!

infosec  pentest  from twitter
9 weeks ago
Twitter
RT : SIEM use cases development workflow – Agile all the things!
by
from twitter
9 weeks ago
Twitter
RT : Great! Vision2
Nmap's XML in, CVE Links out 😎

pentest  infosec  from twitter
10 weeks ago
Twitter
RT : I built an advanced "has my yahoo e-mail account been breached?" script. Should send to I think. Ve…
from twitter
10 weeks ago
Twitter
RT : Keybase announcement right now: End-to-end encrypted Git!
from twitter
10 weeks ago
Keybase launches encrypted git
RT : Keybase announcement right now: End-to-end encrypted Git!
from twitter
10 weeks ago
Tales of a Threat Hunter 1
RT : Detecting Mimikatz & other Suspicious LSASS Access - Part 1 | by Diego Perez
from twitter
september 2017
Twitter
RT : "Using RDP with a domain admin account is REALLY dangerous."
DFIRSummit  from twitter
july 2017
Twitter
RT : Very creepy , someone was apparently typing in an URL and WhatsApp was fetching it off my server char-by-c…
from twitter
june 2017
The Stack Clash – Network Security Blog | Qualys, Inc.
RT : The Stack Clash vulnerability in the memory management of Linux, OpenBSD, NetBSD, FreeBSD and Solaris, on i386/amd64
from twitter
june 2017
Twitter
RT : Detecting Lateral Movement through Tracking Event Logs - by (PDF)
Windows  DFIR  from twitter
june 2017
GitHub - SySS-Research/Seth: Perform a MitM attack and extract clear text credentials from RDP connections
RT : Seth : Perform a MitM attack extract clear text cred' from RDP connections : ,Attacking RDP:
from twitter
june 2017
Seth/Attacking_RDP-Paper.pdf at master · SySS-Research/Seth · GitHub
RT : Seth : Perform a MitM attack extract clear text cred' from RDP connections : ,Attacking RDP:
from twitter
june 2017
Twitter
RT : bingrep
Greps through binaries from various OSs and architectures, and colors them
from twitter
june 2017
GitHub - m4b/bingrep: like grep, but for binaries
RT : bingrep
Greps through binaries from various OSs and architectures, and colors them
from twitter
june 2017
Twitter
RT : awesome-iocs
A collection of sources of indicators of compromise
from twitter
june 2017
GitHub - vulnersCom/getsploit: Command line utility for searching and downloading exploits
RT : Just brilliant. Seach all the exploits from terminal
# ./getsploit.py wordpress 4.7.0
Total found exploits: 8
...
from twitter
june 2017
How to get SQL Server Sysadmin Privileges as a Local Admin with PowerUpSQL
RT : How to get SQL Server Sysadmin Privileges as a Local Admin with PowerUpSQL
from twitter
may 2017
Introduction · Linux Inside
RT @newsycombinator: Linux Inside – How the Linux Kernel Works
linux  kernel  Architecture  linux-kernel 
may 2017
Michael Clemens (exitnode) | Keybase
Verifying myself: I am exitnode on Keybase.io. pCdHFjg4qZgC6jinGFfc0cNyC3SrYKVW0GGJ /
from twitter
may 2017
Metasploit - YouTube
RT : We have a new YouTube channel! We'll be publishing ~biweekly demos of new stuff in Metasploit Framework here
from twitter
may 2017
First crack at Samba CVE-2017-7494 by hdm · Pull Request #8450 · rapid7/metasploit-framework · GitHub
RT : Metasploit exploit for Samba RCE vulnerability CVE-2017-7494 . Pls patch your Samba server and protect your NAS boxes
from twitter
may 2017
Twitter
RT : Local privilege escalation mind map. Far from perfect, but you get the idea. Enjoy.
from twitter
may 2017
VBSMeter/VBSMeter.vbs at master · Cn33liz/VBSMeter · GitHub
RT : With the help of latest DotNetToJScript release:
VBSMeter - a VBScript Reversed TCP Meterpreter Stager
from twitter
may 2017
CPU Utilization is Wrong
RT : My CPU Utilization post had hundreds of comments, so I've added an "Update:" section
from twitter
may 2017
Twitter
RT : Windows Policy Analyzer
> analyzing and comparing sets of group Policies
from twitter
may 2017
Microsoft releases new IT tool, Policy Analyzer - MSPoweruser
RT : Windows Policy Analyzer
> analyzing and comparing sets of group Policies
from twitter
may 2017
Twitter
RT : Here's Mimikatz in JS no file on disk.

How's that PowerShell Logging working of ya ;-)?
from twitter
april 2017
Mimikatz in JS - Courtesy of James Forshaw - https://github.com/tyranid/DotNetToJScript ;-) · GitHub
RT : Here's Mimikatz in JS no file on disk.

How's that PowerShell Logging working of ya ;-)?
from twitter
april 2017
Twitter
RT : ICYMI - If you've used Google search, try reviewing the personal data that's been collected and then clear it:…
from twitter
march 2017
Pi-hole™: A black hole for Internet advertisements – curl -sSL https://install.pi-hole.net | bash
Network-wide ad blocking Install by running one command: curl -sSL https://install.pi-hole.net | bash Our code is completely open, but piping to bash can be dangerous.  For a safer install, review the code and then run the installer locally.  Pi-hole is free, but powered by your donations. https://youtu.be/vKWjx1AQYgs Block Over 100,000 Ad-serving Domains Known ad-serving domains…
adblocker 
march 2017
« earlier      
175 ad adblocker admin algorithm analysis api architecture archive arm atm attackercommunity audit auditing av awesome bluehatil brute business bypass cheat cleartext collection concept credentials cryptolocker cyberprobe debian decrypt deobfuscation derivative design device devops dfir dfirsummit directory directx dma docx domain dump encryption esxi excel exploit extract flip force forensic forensics freiesoftware fsrm funny gateway go golang google gpo graylog guard hardening hash honeypot html htop identify inception incident infosec itsecurity keepass kernel laptop linux linux-kernel lisa16 local lynis malware mangle mcafee metasploit mikrotik mimikatz nagios nessus netsh nmap nut onion online openbsd openvpn os paper pass password payload pcap pdf pentest pf pivoting postexploitation powershell privesc processes programming pth ransomware raspberry rce rdp redteam reports routing runbook security seenabledelegationprivilege selfhosted selinux sheet siem skimmers snort ssh ssl stick sysmon teleconsole thunderbolt tool toolkit tools top tor trace tutorial uac unix updates ups usb usv validate vb visualbasic vmm vuln vulnerability wifi wiki windows word zeroday

Copy this bookmark:



description:


tags: