ツイート
-
THC warned you in 2008 about SIM vulnerabilities. http://wiki.thc.org/gsm/simtoolkit . Enjoy. See also
#simkarten, http://www.forbes.com/sites/parmyolson/2013/07/21/sim-cards-have-finally-been-hacked-and-the-flaw-could-affect-millions-of-phones/ …. -
PowerSploit: The Easiest Shell You’ll Ever Get http://www.pentestgeek.com/2013/07/19/invoke-shellcode/ …
-
Malware Evasion Chart http://marcoramilli.blogspot.gr/2013/07/malware-evasion-chart.html …
-
Useful little JavaScript tool to decode BigIP cookies: http://blog.whitehatsec.com/f5-networks-big-ip-cookie-decoded/ …
-
Good news we will be open public beta-test for HexRaysCodeXplorer. Check our GitHub repository in Monday evening http://rehints.github.io/HexRaysCodeXplorer/ …
-
Mini-Guide to Install Curl and OpenSSL on Android https://www.xda-developers.com/android/mini-guide-to-install-curl-and-openssl-on-android/ …
-
pype32 - Yet another Python library to parse PE/PE+ files http://goo.gl/SXWHN code: https://github.com/crackinglandia/pype32 …
#cls#tools -
DNSViz - A DNS visualization tool for visualizing the status of a DNS zone - http://dnsviz.net/
-
Apache Struts 2 is an elegant, extensible framework for creating enterprise-pwnable Java web apps. Another RCE http://struts.apache.org/release/2.3.x/docs/s2-016.html …
-
Check out our new research and a
@GoogleGlass case study on how to correctly handle vulns in the connected world: http://bit.ly/18mfTI2 -
WCE v1.41beta released (64bit) (minor release) http://www.ampliasecurity.com/research/wce_v1_41beta_x64.zip …
-
#MalwareMustDie NEW#BLOG: Proof of Concept of "CookieBomb" attack http://malwaremustdie.blogspot.jp/2013/07/proof-of-concept-of-cookiebomb-attack.html … pic.twitter.com/fN1L5CnsXX -
Metasploit 4.7's New MetaModules Simplify Security Testing http://r-7.co/11WCyI1
-
Brakeman 2.1.0 is out: ignore false positives, brakeman-min gem, branch limiting ,latest ruby_parser, and more! http://brakemanscanner.org/blog/2013/07/17/brakeman-2-dot-1-0-released/ …
-
I'm listed in Pocket Security Page http://getpocket.com/security
@kamilsevi@bugcrowd -
The Art Of Defuzzing http://buff.ly/12IJKRY
-
C4Decompiler: A general, interactive Machine Code Decompiler for the Intel IA family (x86 based) http://www.c4decompiler.com/ <-
#free#reversing -
Burp plugin which supports in finding privilege escalation vulnerabilities: https://github.com/thomasskora/Burp-SessionAuthTool …
-
Androrat - Android Remote Access Tool http://buff.ly/1bmq5Rd
-
Setting up Backdoors and Reverse Shells on VMware Hypervisors http://buff.ly/15Ea5nj
@hxteamさんはまだツイートしていません。
読み込みに時間がかかっているようです。
Twitter は許容範囲をオーバーしているか、一時的な不具合が発生しています。再度、お試しになるか、Twitter ステータスブログをご確認ください。