Meryem (@mario_wph) 's Twitter Profile
Meryem

@mario_wph

ID: 930175548

calendar_today06-11-2012 17:37:42

184 Tweet

141 Takipçi

434 Takip Edilen

ςεяβεяμs - мαℓωαяε яεsεαяςнεя (@c3rb3ru5d3d53c) 's Twitter Profile Photo

#ASyncRAT #Malware Config Extraction now available on mwcfg.info 🥳🎉 📁 330493a1ba3c3903040c9542e6348fab 🌐 akconsult[.]linkpc[.]net:9872 Happy hunting! 🥳🎉 All code is open-source see links: github.com/c3rb3ru5d3d53c… github.com/c3rb3ru5d3d53c…

#ASyncRAT #Malware Config Extraction now available on mwcfg.info 🥳🎉

📁 330493a1ba3c3903040c9542e6348fab

🌐 akconsult[.]linkpc[.]net:9872

Happy hunting! 🥳🎉

All code is open-source see links:
github.com/c3rb3ru5d3d53c…
github.com/c3rb3ru5d3d53c…
Anshu 🕸️ (@thebitdoodler) 's Twitter Profile Photo

🎯SSL/TLS Encryption #simplified ✨ This is painful for beginners to understand how the #Encryption works in SSL/TLS. Hope this will give #beginners an insight into the above-mentioned topic 😃 #infosec #cybersecurity #SSL #simplifiedsecurity

🎯SSL/TLS Encryption #simplified ✨

This is painful for beginners to understand how the #Encryption works in SSL/TLS.
Hope this will give #beginners an insight into the above-mentioned topic 😃

#infosec #cybersecurity #SSL #simplifiedsecurity
Lukas Stefanko (@lukasstefanko) 's Twitter Profile Photo

MalwareHunterTeam Launching VPN services requires user to first log in to Facebook The app then steals Facebook credentials by injecting JavaScript into facebook[.]com that is displayed in WebView of the app. Reported to Google Play.

bohops (@bohops) 's Twitter Profile Photo

Here are a few tool resources for using WinRM w/o PowerShell winrs.exe: docs.microsoft.com/en-us/windows-… winrm.vbs: docs.microsoft.com/en-us/windows/… Evil-WinRM: github.com/Hackplayers/ev… CSharpWinRM: github.com/mez-0/CSharpWi… winrmdll: github.com/mez-0/winrmdll WSMan-WinRM: github.com/bohops/WSMan-W… 1/2

The DFIR Report (@thedfirreport) 's Twitter Profile Photo

From Zero to Domain Admin ➡️Initial Access: Maldoc deploys Hancitor ➡️C2: #CobaltStrike & #Hancitor ➡️Discovery: net, nltest, check.exe, AD module, scan for backup systems ➡️Privilege Escalation: Zerologon CVE-2020-1472 thedfirreport.com/2021/11/01/fro…

Elliot (@elliotkillick) 's Twitter Profile Photo

Need to go under the radar downloading #mimikatz (and other suspect payloads)? Then newly discovered #lolbin "C:\Windows\System32\Cmdl32.exe" (signed by MS) is for you. It's like a new certutil.exe but absolutely unheard of by any antivirus software!

Data Leak Monitoring System (@dataleakmonitor) 's Twitter Profile Photo

⚠ Detect Data ⚠ { "Threat Actor": "xainn", "Content": "Turkish customs data”, "Detection Date": “26 Jan 2022 12:11”, "Type": "#Dataleak" } #CyberSecurity #InfoSec 🔹Data Leak monitoring system🔹

⚠ Detect Data ⚠
{
"Threat Actor": "xainn",
  "Content": "Turkish customs data”,
  "Detection Date": “26 Jan 2022 12:11”,
  "Type": "#Dataleak"
}
#CyberSecurity #InfoSec

🔹Data Leak monitoring system🔹
PT SWARM (@ptswarm) 's Twitter Profile Photo

🔥 We have reproduced the fresh CVE-2022-22954 Server-Side Template Injection in VMware Workspace ONE Access. Successful exploitation could lead to RCE from an unauthenticated user. Patch ASAP!

🔥 We have reproduced the fresh CVE-2022-22954 Server-Side Template Injection in VMware Workspace ONE Access.

Successful exploitation could lead to RCE from an unauthenticated user.

Patch ASAP!