r00t0vi4 (@r00t0vi4) 's Twitter Profile
r00t0vi4

@r00t0vi4

Malware Analysis, Security Research and Incident Response

ID: 1582350066

linkhttps://github.com/r00t0vi4 calendar_today10-07-2013 06:25:48

922 Tweet

500 Followers

638 Following

r00t0vi4 (@r00t0vi4) 's Twitter Profile Photo

Hayabusa is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs written in Rust. #dfir #forensics #rust github.com/Yamato-Securit…

Hayabusa is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs written in Rust.

#dfir #forensics #rust

github.com/Yamato-Securit…
Shubham Sharma (@shubham_pen) 's Twitter Profile Photo

Digital Evidence Cheat Sheet Credit: SANS DFIR #infosec #cybersecurity #pentesting #oscp #informationsecurity #hacking #cissp #redteam #technology #DataSecurity #CyberSec #Hackers #tools #bugbountytips #Linux #websecurity #Network #NetworkSecurity #cybersecurityawareness

Digital Evidence Cheat Sheet
Credit: <a href="/sansforensics/">SANS DFIR</a>

#infosec #cybersecurity #pentesting #oscp  #informationsecurity #hacking #cissp #redteam #technology #DataSecurity #CyberSec #Hackers #tools #bugbountytips #Linux #websecurity #Network #NetworkSecurity #cybersecurityawareness
Ahmet Göker🇹🇷🇳🇱 (@_shadowintel_) 's Twitter Profile Photo

Kali Purple: You Do You! Practice Ops: Virtualization, firewalls, VLAN, WAF, SIEM, IDS/IPS, ... Practice Red: Penetration testing of vulnerable machines while seeing what the blue team sees. Can you become stealthier? gitlab.com/kalilinux/docu…

Kali Purple: You Do You!

Practice Ops: Virtualization, firewalls, VLAN, WAF, SIEM, IDS/IPS, ...

Practice Red: Penetration testing of vulnerable machines while seeing what the blue team sees. Can you become stealthier?

gitlab.com/kalilinux/docu…
The Haag™ (@m_haggis) 's Twitter Profile Photo

I was curious a while back (last summer) about RATs, and how many may be found on the open net. Not complete in any sense (at all). But, maybe useful for someone out there. Enjoy some RATs! docs.google.com/spreadsheets/d… #ThreatHunting #BlueTeam

HackGit (@hack_git) 's Twitter Profile Photo

passivedns A network sniffer that logs all DNS server replies for use in a passive DNS setup. github.com/gamelinux/pass… #cybersecurity #infosec #pentesting t.me/hackgit/8475

passivedns

A network sniffer that logs all DNS server replies for use in a passive DNS setup.

github.com/gamelinux/pass…

#cybersecurity #infosec #pentesting
t.me/hackgit/8475
Osint For All (@allforosint) 's Twitter Profile Photo

Hey 🕵️‍♂️#OSINT🕵️‍♀️ 👀, DNS History has the largest DNS record history database, with more than 2.2 billion nameserver changes detected, daily updated. #CyberSec #bugbountytips #bugbountytip #DNS #threatintel #threatintell completedns.com/dns-history/

Hey 🕵️‍♂️#OSINT🕵️‍♀️ 👀, DNS History has the largest DNS record history database, with more than 2.2 billion nameserver changes detected, daily updated. #CyberSec #bugbountytips #bugbountytip #DNS #threatintel #threatintell 

completedns.com/dns-history/
HackGit (@hack_git) 's Twitter Profile Photo

Depix A tool for recovering passwords from pixelized screenshots. github.com/beurtschipper/… #cybersecurity #infosec t.me/hackgit/8823

Depix

A tool for recovering passwords from pixelized screenshots.

github.com/beurtschipper/…

#cybersecurity #infosec
t.me/hackgit/8823
Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - krisnova/boopkit: Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin. github.com/krisnova/boopk…

Kyle Cucci (@d4rksystem) 's Twitter Profile Photo

Interesting project for anti-forensics and evasion. Blue-teamers should study this one for learning 🤓 github.com/PaulNorman01/F…

Interesting project for anti-forensics and evasion. Blue-teamers should study this one for learning 🤓

github.com/PaulNorman01/F…
Alexandre Dulaunoy @adulau@infosec.exchange (@adulau) 's Twitter Profile Photo

GeoOpen and mmdb-server: A Comprehensive Open-Source Solution for IP Address Geolocation. hdoc.csirt-tooling.org/OgdCNqHYQpukzR… my lighting talk at Pass the SALT Conference #opensource #geoiplookup

Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - marcosValle/awesome-windows-red-team: A curated list of awesome Windows frameworks, libraries, software and resources for Red Teams github.com/marcosValle/aw…

Kurosh Dabbagh (@_kudaes_) 's Twitter Profile Photo

Somebody asked if you can run a dll directly without rundll32 as you would do with an exe. You just need to remove the IMAGE_FILE_DLL flag from IMAGE_FILE_HEADER->Characteristics, which can be done with the option -e of github.com/Kudaes/CustomE…. Don't see much use for it tho ^^

Somebody asked if you can run a dll directly without rundll32 as you would do with an exe. You just need to remove the IMAGE_FILE_DLL flag from IMAGE_FILE_HEADER-&gt;Characteristics, which can be done with the option -e of github.com/Kudaes/CustomE…. Don't see much use for it tho ^^
Forensic Focus (@forensicfocus) 's Twitter Profile Photo

EventLogExpert: A free and open source Windows Event Log viewer (hat tip to Husam Shbib on LinkedIn for the link) #digitalforensics github.com/microsoft/Even…

Thorsten E. (@endi24) 's Twitter Profile Photo

active-directory-security The "Monash Enterprise Access Model" (MEAM) is a model for tiering Active Directory that builds heavily on the Microsoft Enterprise Access Model. github.com/mon-csirt/acti…