Twitter
RT : Great! Vision2
Nmap's XML in, CVE Links out 😎

pentest  infosec  from twitter
8 days ago
Twitter
RT : I built an advanced "has my yahoo e-mail account been breached?" script. Should send to I think. Ve…
from twitter
11 days ago
Twitter
RT : Keybase announcement right now: End-to-end encrypted Git!
from twitter
11 days ago
Keybase launches encrypted git
RT : Keybase announcement right now: End-to-end encrypted Git!
from twitter
11 days ago
Tales of a Threat Hunter 1
RT : Detecting Mimikatz & other Suspicious LSASS Access - Part 1 | by Diego Perez
from twitter
4 weeks ago
Twitter
RT : "Using RDP with a domain admin account is REALLY dangerous."
DFIRSummit  from twitter
july 2017
Twitter
RT : Very creepy , someone was apparently typing in an URL and WhatsApp was fetching it off my server char-by-c…
from twitter
june 2017
The Stack Clash – Network Security Blog | Qualys, Inc.
RT : The Stack Clash vulnerability in the memory management of Linux, OpenBSD, NetBSD, FreeBSD and Solaris, on i386/amd64
from twitter
june 2017
Twitter
RT : Detecting Lateral Movement through Tracking Event Logs - by (PDF)
Windows  DFIR  from twitter
june 2017
GitHub - SySS-Research/Seth: Perform a MitM attack and extract clear text credentials from RDP connections
RT : Seth : Perform a MitM attack extract clear text cred' from RDP connections : ,Attacking RDP:
from twitter
june 2017
Seth/Attacking_RDP-Paper.pdf at master · SySS-Research/Seth · GitHub
RT : Seth : Perform a MitM attack extract clear text cred' from RDP connections : ,Attacking RDP:
from twitter
june 2017
Twitter
RT : bingrep
Greps through binaries from various OSs and architectures, and colors them
from twitter
june 2017
GitHub - m4b/bingrep: like grep, but for binaries
RT : bingrep
Greps through binaries from various OSs and architectures, and colors them
from twitter
june 2017
Twitter
RT : awesome-iocs
A collection of sources of indicators of compromise
from twitter
june 2017
GitHub - vulnersCom/getsploit: Command line utility for searching and downloading exploits
RT : Just brilliant. Seach all the exploits from terminal
# ./getsploit.py wordpress 4.7.0
Total found exploits: 8
...
from twitter
june 2017
How to get SQL Server Sysadmin Privileges as a Local Admin with PowerUpSQL
RT : How to get SQL Server Sysadmin Privileges as a Local Admin with PowerUpSQL
from twitter
may 2017
Introduction · Linux Inside
RT @newsycombinator: Linux Inside – How the Linux Kernel Works
linux  kernel  Architecture  linux-kernel 
may 2017
Michael Clemens (exitnode) | Keybase
Verifying myself: I am exitnode on Keybase.io. pCdHFjg4qZgC6jinGFfc0cNyC3SrYKVW0GGJ /
from twitter
may 2017
Metasploit - YouTube
RT : We have a new YouTube channel! We'll be publishing ~biweekly demos of new stuff in Metasploit Framework here
from twitter
may 2017
First crack at Samba CVE-2017-7494 by hdm · Pull Request #8450 · rapid7/metasploit-framework · GitHub
RT : Metasploit exploit for Samba RCE vulnerability CVE-2017-7494 . Pls patch your Samba server and protect your NAS boxes
from twitter
may 2017
Twitter
RT : Local privilege escalation mind map. Far from perfect, but you get the idea. Enjoy.
from twitter
may 2017
VBSMeter/VBSMeter.vbs at master · Cn33liz/VBSMeter · GitHub
RT : With the help of latest DotNetToJScript release:
VBSMeter - a VBScript Reversed TCP Meterpreter Stager
from twitter
may 2017
CPU Utilization is Wrong
RT : My CPU Utilization post had hundreds of comments, so I've added an "Update:" section
from twitter
may 2017
Microsoft releases new IT tool, Policy Analyzer - MSPoweruser
RT : Windows Policy Analyzer
> analyzing and comparing sets of group Policies
from twitter
may 2017
Twitter
RT : Windows Policy Analyzer
> analyzing and comparing sets of group Policies
from twitter
may 2017
Twitter
RT : Here's Mimikatz in JS no file on disk.

How's that PowerShell Logging working of ya ;-)?
from twitter
april 2017
Mimikatz in JS - Courtesy of James Forshaw - https://github.com/tyranid/DotNetToJScript ;-) · GitHub
RT : Here's Mimikatz in JS no file on disk.

How's that PowerShell Logging working of ya ;-)?
from twitter
april 2017
Twitter
RT : ICYMI - If you've used Google search, try reviewing the personal data that's been collected and then clear it:…
from twitter
march 2017
Pi-hole™: A black hole for Internet advertisements – curl -sSL https://install.pi-hole.net | bash
Network-wide ad blocking Install by running one command: curl -sSL https://install.pi-hole.net | bash Our code is completely open, but piping to bash can be dangerous.  For a safer install, review the code and then run the installer locally.  Pi-hole is free, but powered by your donations. https://youtu.be/vKWjx1AQYgs Block Over 100,000 Ad-serving Domains Known ad-serving domains…
adblocker 
march 2017
Twitter
RT : The increased use of PowerShell in attacks | by (PDF) Dec 2016
> good resource for blue teams…
from twitter
march 2017
PaulSec/awesome-windows-domain-hardening: A curated list of awesome Security Hardening techniques for Windows.
awesome-windows-domain-hardening - A curated list of awesome Security Hardening techniques for Windows.
hardening  windows 
march 2017
ion-storm/sysmon-config: Sysmon configuration file template with default high-quality event tracing
sysmon-config - Sysmon configuration file template with default high-quality event tracing
sysmon  graylog 
march 2017
(429) https://twitter.com/ionstorm/status/836789820315828225/photo/1
RT : My Sysmon Threat Intelligence Dashboard for Graylog Available for Download:
from twitter
march 2017
nexxai/CryptoBlocker: A script to deploy File Server Resource Manager and associated scripts to block infected users
CryptoBlocker - A script to deploy File Server Resource Manager and associated scripts to block infected users
ransomware  powershell  fsrm 
february 2017
GitHub - securitywithoutborders/hardentools
Contribute to hardentools development by creating an account on GitHub.
windows  hardening 
february 2017
Twitter
RT : In case you thought intercepting cell-phones is hard. nope. and pretty cheap, too.
from twitter
february 2017
« earlier      
175 ad adblocker admin algorithm analysis api architecture archive arm atm attackercommunity audit auditing av awesome bluehatil brute business bypass cheat cleartext collection concept credentials cryptolocker cyberprobe debian decrypt deobfuscation derivative design device devops dfir dfirsummit directory directx dma docx domain dump encryption esxi excel exploit extract flip force forensic forensics freiesoftware fsrm funny gateway go golang google gpo graylog guard hardening hash honeypot html htop identify inception incident infosec itsecurity keepass kernel laptop linux linux-kernel lisa16 local lynis malware mangle mcafee metasploit mikrotik mimikatz nagios nessus netsh nmap nut onion online openbsd openvpn os paper pass password payload pcap pdf pentest pf pivoting postexploitation powershell privesc processes programming pth ransomware raspberry rce rdp redteam reports routing runbook security seenabledelegationprivilege selfhosted selinux sheet siem skimmers snort ssh ssl stick sysmon teleconsole thunderbolt tool toolkit tools top tor trace tutorial uac unix updates ups usb usv validate vb visualbasic vmm vuln vulnerability wifi wiki windows word zeroday

Copy this bookmark:



description:


tags: