Twitter
RT : The company that sent me the pictured fingerprint lock has provided the security quote of the year: “...the lock is…
from twitter
4 weeks ago
Twitter
RT : Microsoft Red Team and Pentesting

collection of open source and commercial tools that aid…
from twitter_favs
4 weeks ago
Twitter
RT : Literally spin up and automate getting OpenVPN Certs: wget -O && ba…
from twitter_favs
4 weeks ago
(500) http://openvpn-install.sh
RT : Literally spin up and automate getting OpenVPN Certs: wget -O && ba…
from twitter_favs
4 weeks ago
Twitter
RT : Security/Network Operations Centers
Expectation vs. Reality
from twitter_favs
5 weeks ago
Twitter
"Non-root can't bind to ports <1024"? Not since Linux 4.11 in May 2017:

$ nc -nvlp 1
nc: Permission denied
$ echo…
from twitter_favs
6 weeks ago
Twitter
Sigma converter now supports
>
>
thanks go to for their ongoing support of the commun…
ArcSight  Qualys  from twitter_favs
6 weeks ago
Endpoint detection Superpowers on the cheap — part 1
I just published “Endpoint detection Superpowers on the cheap — part 1”
from twitter_favs
6 weeks ago
Choose an open source license | Choose a License
Don't know what license to choose for your software project? Then might be for you.
from twitter
6 weeks ago
Twitter
wtf : A personal information dashboard for your terminal :
from twitter_favs
6 weeks ago
Twitter
RT : Efail is a prime example of irresponsible disclosure. There is no responsibility in hyping the story to and ma…
from twitter_favs
9 weeks ago
Twitter
Excellent use of windows built-in commands to send data out via DNS!
from twitter_favs
10 weeks ago
Twitter
New 1-page cheat sheet is out! Writing tips for IT pros, based on my experiences writing as a consultant, author, i…
from twitter_favs
10 weeks ago
Twitter
RT : Passing the hash with native RDP client (mstsc.exe)

infosec  pentest  from twitter_favs
10 weeks ago
Our Approach to Employee Security Training | PagerDuty
Interesting insights into security awareness trainings at PagerDuty:
from twitter
10 weeks ago
Twitter
RT : Heathrow departure board operators, you have excelled yourselves...
StarWarsDay  MayThe4thBeWithYou  from twitter
10 weeks ago
Untitled (https://www.youtube.com/watch?v=KvSZleOozLU&feature=youtu.be)
How to evaluate security solutions? and I shared our perspectives during this episode:
from twitter_favs
11 weeks ago
Twitter
WinPwnage : A Collection of Python Scripts for UAC Bypass,Privilege Escalation, Dll Hijack and Many More Techniques…
from twitter_favs
11 weeks ago
Twitter
RT : Because it is so complicated to test if v1, v2 or v3 is active I've released in open source the smb scanner of…
SMB  from twitter_favs
11 weeks ago
Twitter
I vote for the newsletter. It's much easier to skip things that are not of interest, I don't need e…
from twitter
11 weeks ago
(403) http://blog.secu.dk/blog/Tunnels_in_a_hard_filtered_network/
Pivoting through HTTP webshells with Tunna: SOCKS proxy webshells (ASP, PHP & JSP)
redteam  from twitter_favs
12 weeks ago
Twitter
Pivoting through HTTP webshells with Tunna: SOCKS proxy webshells (ASP, PHP & JSP)
redteam  from twitter_favs
12 weeks ago
Twitter
One more thought: map the to rules online in same window. Its live, its free and you can now wr…
Sigma  from twitter_favs
april 2018
Twitter
BREAKING: The day has come! My text adventure 1 - This Place is Death, the first…
C64  Hibernated  from twitter_favs
april 2018
GitHub - gpoguy/GetVulnerableGPO: PowerShell script to find 'vulnerable' security-related GPOs that should be hardended
GetVulnerableGPO. PowerShell script to find 'vulnerable' security-related GPOs that should be hardended
from twitter_favs
april 2018
It's time to rebuild the web - O'Reilly Media
Very interesting read: "It's time to rebuild the web" by Mike Loukides
from twitter
april 2018
(404) https://t.co/l9KgmGobTq%5Cfo
RT : This little can download files from webdav:

print /D:c:\outfolder\outfile.exe \\…
LOLBin  from twitter
april 2018
Twitter
RT : This little can download files from webdav:

print /D:c:\outfolder\outfile.exe \\…
LOLBin  from twitter
april 2018
Kilobytemagazine2018 1 by KilobyteMagazine - issuu
Issue 1/2018 is here. Download it for free and spread the word, please.
Find it at issuu:

O…
from twitter_favs
april 2018
Twitter
Issue 1/2018 is here. Download it for free and spread the word, please.
Find it at issuu:

O…
from twitter_favs
april 2018
Hexacorn | Blog
How to become the best Malware Analyst E-V-E-R feedback welcome cc
malware  dfir  from twitter_favs
april 2018
Painless Cuckoo Sandbox Installation | NVISO LABS – blog
Blue teamers, don’t forget your Cuckoo Sandbox or... did I mean red team? Anyhow, still dec…
from twitter_favs
april 2018
Twitter
Blue teamers, don’t forget your Cuckoo Sandbox or... did I mean red team? Anyhow, still dec…
from twitter_favs
april 2018
Twitter
RT : Exfiltrating data via power lines. Very interesting and cool covert channel. Bypasses air-gaps. 1000b/s.…
from twitter
april 2018
Twitter
Not allowed to use copy.exe?
Use print.exe instead. Can also be used to add data to alternate data streams.…
from twitter_favs
april 2018
Reflecting upon OWASP TOP-10 IoT Vulnerabilities – Embedi
RT : Extremely cool write up on examples of IoT vulnerabilities as they relate to the OWASP IoT Top 10.
infosec  iot  from twitter
april 2018
Twitter
Knowing Little Snitch from my Mac past, this sounds promising.
from twitter
april 2018
GitHub - dbohdan/structured-text-tools: A list of command line tools for manipulating structured text data
Life is not only about doing cool stuff. Here's a list of command line tools for manipulating structured text data:
from twitter
april 2018
Twitter
As soon as I find the time, I really need to check out the new 4.0 release of . It…
from twitter
april 2018
Qubes OS 4.0 has been released! | Qubes OS
As soon as I find the time, I really need to check out the new 4.0 release of . It…
from twitter
april 2018
Blue Team fundamentals Part Two: Windows Processes.
RT : Blue Team fundamentals Part Two: Windows Processes
by (in Mar 2017)
from twitter_favs
april 2018
Twitter
RT : Blue Team fundamentals Part Two: Windows Processes
by (in Mar 2017)
from twitter_favs
april 2018
Twitter
RT : Just put up a Big Update to the Commodore 8-Bit Buyer's Guide. Now 25% more products, projects and kits.…
8bitbuyer  from twitter_favs
april 2018
A Shodan Tutorial and Primer
This isn't a great Shodan tutorial, but it's one of the only ones.

infosec  from twitter_favs
april 2018
Twitter
RT : MUCH-AWAITED UPDATE HERE
Watch filtered IOCs with lots of useful information like hashes, C2 requests, dropped exec…
from twitter_favs
april 2018
Incident Response
Good incident response playbook example:
from twitter
april 2018
Twitter
RT : Announcing 1.1.1.1: the fastest, privacy-first consumer DNS service -
from twitter_favs
april 2018
Announcing 1.1.1.1: the fastest, privacy-first consumer DNS service
RT : Announcing 1.1.1.1: the fastest, privacy-first consumer DNS service -
from twitter_favs
april 2018
Twitter
RT : Get Domain Admins (GDA). script to locate systems running processes with a Domain Admin account so that pentesters…
from twitter_favs
march 2018
Untitled (http://LetMeOutOfYour.Net)
RT : is back online. It's an egress testing tool that you can hit via UDP, HTTP, HTTPS, or SSH o…
from twitter_favs
march 2018
Twitter
RT : is back online. It's an egress testing tool that you can hit via UDP, HTTP, HTTPS, or SSH o…
from twitter_favs
march 2018
Twitter
RT : Our team just released , an open-source distributed YARA scanner to help researchers hunt advanced…
GReAT  KLARA  from twitter_favs
march 2018
Twitter
You collect TBs of log data in your and don't know what to search for?
You want to do more than pie charts fo…
SIEM  from twitter_favs
march 2018
Twitter
RT : Please tell me AV are not autodeleting logs. 🤭
from twitter
march 2018
Twitter
Working on a pretty cool "The Bug Hunter's Methodology" Mindmap for you all this weekend =) Stay tuned!
from twitter_favs
march 2018
Twitter
RT : Look at this; it's almost a match made in heaven, or at least, a heavenly match
computers  zx80  from twitter
march 2018
« earlier      
175 ad adblocker admin algorithm analysis api architecture archive arm atm attackercommunity audit auditing av awesome bluehatil brute business bypass cheat cleartext collection concept credentials cryptolocker cyberprobe debian decrypt deobfuscation derivative design device devops dfir dfirsummit directory directx dma docx domain dump encryption esxi excel exploit extract flip force forensic forensics freiesoftware fsrm funny gateway go golang google gpo graylog guard hardening hash honeypot html htop identify inception incident infosec itsecurity keepass kernel laptop linux linux-kernel lisa16 local lynis malware mangle mcafee metasploit mikrotik mimikatz nagios nessus netsh nmap nut onion online openbsd openvpn os paper pass password payload pcap pdf pentest pf pivoting postexploitation powershell privesc processes programming pth ransomware raspberry rce rdp redteam reports routing runbook security seenabledelegationprivilege selfhosted selinux sheet siem skimmers snort ssh ssl stick sysmon teleconsole thunderbolt tool toolkit tools top tor trace tutorial uac unix updates ups usb usv validate vb visualbasic vmm vuln vulnerability wifi wiki windows word zeroday

Copy this bookmark:



description:


tags: