RT @cprofiler@twitter.com

Cerbero Suite 3.3 is out! - cerbero-blog.com/?p=1842 - Theme support, hugely improved native UI for Ghidra, MachO Carbon support, XP compatibility and a few bug fixes. Happy hacking!

🐦🔗: twitter.com/cprofiler/status/1

RT @2xyo@twitter.com

Mitre ATT&CK Sub-Techniques Preview:
- New ID numbering
- New techniques
- Technique decomposition
- Technique realignment and deprecation
- Technique-to-sub-technique demotion

medium.com/mitre-attack/attack

By @MITREattack@twitter.com

🐦🔗: twitter.com/2xyo/status/116480

RT @TencentTic@twitter.com

Tencent Security Team has worked out a stable POC of CVE-2019-1181/1182. It works on Win7 to Win10. Patch your system as soon as possible. REF:
s.tencent.com/research/bsafe/7

🐦🔗: twitter.com/TencentTic/status/

RT @PyroTek3@twitter.com

Today at Black Hat @markmorow@twitter.com
& I presented on "Attacking & Defending the Microsoft Cloud."

Slides are now available to download:
adsecurity.org/?p=4179

We covered several attacks (& defense): password spray, token theft, password reuse, on-prem cloud integration, & more!

🐦🔗: twitter.com/PyroTek3/status/11

RT @zackwhittaker@twitter.com

Hey @TimiHealth@twitter.com. You might want to check your email. I'm going to hazard a guess and say this is probably not good.

🐦🔗: twitter.com/zackwhittaker/stat

RT @campuscodi@twitter.com

IBM X-Force details new "warshipping" technique that relies on criminal groups shipping packages with malicious WiFi equipment within a company's network range, so they can perform wireless attacks on the internal network

securityintelligence.com/posts

🐦🔗: twitter.com/campuscodi/status/

RT @evilsocket@twitter.com

You can turn a cheap rpi0w into a plug and play ethernet gadget to upgrade any device to a pentest platform. Nexmon allows monitor mode on the default WiFi running @bettercap@twitter.com and its web UI. Boots in seconds, deauths and gets handshakes like a mf 😬

🐦🔗: twitter.com/evilsocket/status/

RT @philofishal@twitter.com

Thanks to @SentinelOne@twitter.com @patrickwardle@twitter.com, my free ebook of How To Reverse Malware is now available. Learn to set up a safe test lab, find samples, static + dynamic analysis. eBook is free; tools you need are free. 😁go.sentinelone.com/ebook-macos

🐦🔗: twitter.com/philofishal/status

RT @binitamshah@twitter.com

PowerHub : A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting : github.com/AdrianVollmer/Power

🐦🔗: twitter.com/binitamshah/status

RT @binitamshah@twitter.com

usbrip : Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux : github.com/snovvcrash/usbrip

🐦🔗: twitter.com/binitamshah/status

RT @WhoStoleHonno@twitter.com

👋

I made a GZIP file that infinitely contains itself! Includes a self-referencing CRC~

blog.matthewbarber.io/download

(remove backslash as I don't want to be banned for spreading zip bombs lol)

Want to know how to make one yourself?

Read 👇

blog.matthewbarber.io/2019/07/

🐦🔗: twitter.com/WhoStoleHonno/stat

RT @polarply@twitter.com

botnet found to be integrating a scanner along with newer exploit modules.
Blog upcoming by @ulexec@twitter.com and me.

🐦🔗: twitter.com/polarply/status/11

RT @iotcert@twitter.com

💬🛡️ [@defcon@twitter.com] This year again, our senior security researcher @virtualabs@twitter.com will give a talk at about . 10 August, 12:00 time 🇺🇸.
More info: bit.ly/2XQtMt2

🐦🔗: twitter.com/iotcert/status/115

RT @ANSSI_FR@twitter.com

C'est officiel ! La composition finale de la vient de tomber après ladernière étape de sélection lors de @_leHACK_@twitter.com !
Découvrez l'équipe qui se mesurera à ses homologues européens lors de l' en octobre
🏅ssi.gouv.fr/actualite/retrouve

🐦🔗: twitter.com/ANSSI_FR/status/11

Show more
Mastodon

On « Tweet » sur Twitter ; on « Toot » sur Mastodon. Sur ce réseau social plein de libertés, TeDomum met à disposition une modeste instance. N'hésitez pas à nous solliciter pour la modération ou des ajustements de configuration.