 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Les Tweets pour Ivanlef0u |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour " Ivanlef0u" (1165 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter Ivanlef0u[2012-10-10] - 01:42:04 - RT @SecMailLists: BUGTRAQ: Privilege Escalation Vulnerability in Microsoft Windows http://t.co/IbYLXs6v[2012-10-08] - 19:11:13 - RT @erikloman: New TDL4 strain very successful in hiding from AV. Bootkit Sst.c infects VBR and going strong - for months:http://t.co/M ...[2012-10-08] - 19:11:13 - RT @Gunther_AR: PAPER: Fast, Reliable and Runtime Protection Method Against Table Index Overflows - http://t.co/IWLKAMzN by @PiotrBania[2012-10-06] - 18:55:51 - RT @hackerfantastic: Releasing portable 64bit OS-X kernel rootkit that uses no hardcoded address for Lion below. http://t.co/pFezR ...[2012-10-05] - 14:49:07 - RT @Gunther_AR: Securing The Kernel Via Static Binary Rewriting, ProgramShepherding and Partial Control Flow Integrity http://t.co/4z3G ...[2012-10-05] - 14:49:07 - RT @Antelox: OllyDbg 2.01g - Major update: http://t.co/P12pWrQa[2012-10-05] - 04:18:33 - RT @axcheron: New vicious UEFI bootkit vuln found for Windows 8 http://t.co/NtahGlzu[2012-10-04] - 02:41:30 - RT @hannibals: Here are the slides from our talk (with @acid_) HTML5 Heap Spray at #EUSecWest https://t.co/MlGgJ9YS[2012-10-02] - 22:39:52 - RT @msfdev: MS11_080 AFD JoinLeaf local privilege escalation hits #metasploit thanks to @_sinn3r and zeroSteiner - http://t.co/quEvdG7b[2012-10-02] - 22:39:52 - RT @Blackmond_: New method of AV killing [Kaspersky, Norton, McAfee, ...] - 0day http://t.co/7soUHGrj via @artem_i_baranov[2012-09-27] - 18:58:17 - RT @nudehaberdasher: Links are back! SQLi-2-MIPS | CRIME | Running+Hacking | Trend report | IE 0-day https://t.co/eTVum6gy[2012-09-27] - 18:58:17 - RT @badishi: Brute-Forcing ASLR on Windows http://t.co/lDmHs80R[2012-09-27] - 18:58:17 - RT @k_sOSe: it seems(thx @angelodellaera for pointing this out) that BlackHole has a shellcode able to bypass EMET EAF even if they're n ...[2012-09-27] - 18:58:17 - RT @k_sOSe: ...they just return in RtlGetCurrentPeb, probably a cutpaste of Skylined shellcode http://t.co/jFottL6Y[2012-09-27] - 18:58:17 - RT @VUPEN: We found a Win7 0day that transforms almost any IE vuln into a sophisticated ASLR/DEP bypass without using any Leak/ROP/Plugi ...[2012-09-27] - 18:58:17 - RT @yuange75: My exploit wrote in 2009 ASLR/DEP bypass without using any Leak/ROP/Plugin. Without modification, can be applied to Win8+ ...[2012-09-27] - 09:49:19 - RT @iMHLv2: New @volatility plugins for analyzing USER objects in kernel space and the win32k.sys gahti http://t.co/X9gTPYUF #dfir #malw ...[2012-09-27] - 09:49:19 - RT @matrosov: HiddenFsReader tool ready to download http://t.co/RWkFyfR3 Also can dump malicious MBR/VBR or any range of sectors @vxradi ...[2012-09-21] - 23:05:10 - RT @nullandnull: Importing Ollydbg Addresses into IDA http://t.co/tcjVglNT[2012-09-20] - 21:02:39 - RT @jness: More info about the Fix It for current IE 0day, how it works: http://t.co/lUJfM9Qu Also, has anyone seen exploit that doesn' ...[2012-09-20] - 21:02:39 - RT @Rogunix: Defeating PatchGuard http://t.co/63XDO4oi[2012-09-19] - 22:37:56 - RT @snowfl0w: contagio: CVE-2012-4969 Internet explorer 0day samples http://t.co/LPMTF7Ry[2012-09-18] - 23:09:33 - RT @ABazhanyuk: UEFI technology: say hello to the Windows 8 bootkit!: http://t.co/sX71i1RR[2012-09-18] - 00:45:35 - RT @EdiStrosar: RT @binjo http://t.co/X0SKJofo IE 0-day analysis from @instruder of @vulnhunt[2012-09-18] - 00:45:35 - RT @Dinosn: metasploit magic : Add IE 0day exploiting the execcommand uaf http://t.co/AQ2fKjjg ( the new 0day already in metasploit )[2012-09-18] - 00:45:35 - RT @WTFuzz: Couldnt resist, wrote a poc for the 0day found by @eromang for IE9 that works on clean W7 systems, no java ROP required.[2012-09-17] - 07:03:46 - RT @eromang: New blog post: Zero-Day Season Is Really Not Over Yet http://t.co/U3Bakc0g #zataz #infosec[2012-09-16] - 08:21:06 - RT @j00ru: Random weekend post: Fun facts: Windows kernel and Device Extension Size http://t.co/mJc6xfZl[2012-09-15] - 04:22:44 - RT @real_redp: new in w8 undocumented way to call user-mode notifiers from kernel - WNF: http://t.co/mUjCA1Vy[2012-09-14] - 17:37:25 - RT @pa_kt: I've been working on a Turing complete ROP compiler for a while. Example payload computing the Fibonacci sequence: http://t.c ...[2012-09-11] - 04:19:30 - RT @nudehaberdasher: Quick links from some weekend reading: NaCl | Real Pentesting | AppArmor | MS Help ASLR bypasshttps://t.co/9KX6EXDV[2012-09-10] - 12:04:36 - RT @malerisch: Turning Meterpreter EXE into a DLL, some suggestions: http://t.co/AysY7WO5 - need to test it, might be useful in some cas ...[2012-09-09] - 12:21:36 - RT @gentilkiwi: #mimikatz utilisable en mémoire, sans librairie (même cachée) - était attendue par les utilisateurs de Metasploit ;) - h ...[2012-09-07] - 22:00:33 - RT @damienmiller: Introducing Chrome's next-generation Linux sandbox: http://t.co/vjiXwhXo (seccomp-bpf, which we also use in OpenSSH)[2012-09-07] - 22:00:33 - RT @Dinosn: DLL Injection and Windows 8 http://t.co/MpQyIZih[2012-09-06] - 22:34:29 - RT @daveaitel: Java patches 4 bugs total - details here : http://t.co/yUWhSuLJ[2012-09-06] - 22:34:29 - RT @NTarakanov: It's 2012, but some windows kernel developers still dont know, that METHOD_BUFFERED is dangerous as METHOD_NEITHER[2012-09-06] - 22:34:29 - RT @WTFuzz: heapspray aligned @ 0x10000:document.createElement('canvas').getContext('2d').createImageData(0x10000000/4-0x20,1); .data = ...[2012-08-20] - 13:40:44 - RT @_argp: Heap exploitation abstraction by example (bonus points if you get the weirding module reference): http://t.co/3Uoufbk3[2012-08-20] - 13:40:44 - RT @aaronportnoy: Heh, someone (LMH in this case) finally discussing the building of ROP payloads dynamically using infoleaks: https://t ...[2012-08-20] - 13:40:44 - OllyDbg 2.01 http://t.co/GER5zwie[2012-08-16] - 14:45:36 - RT @VUPEN: Microsoft released security updates to fix critical vulns affecting IE, Windows, RDP, Kernel, Office, and Visio http://t.co/2 ...[2012-08-16] - 14:45:36 - RT @j00ru: PDF fuzzing and Adobe Reader 9.5.1 and 10.1.3 multiple critical vulnerabilities. See blog posts: http://t.co/vJI05HFp http: ...[2012-08-16] - 14:45:36 - RT @ntdebugging: .extpath ? Displays the current debug extension dll search path. Use .extpath+ to add to the path. #debug ^DN[2012-08-16] - 14:45:36 - RT @Dinosn: The Stack Cookies Bypass on CVE-2012-0549 https://t.co/SZjQ6RFk[2012-08-14] - 18:17:05 - RT @nudehaberdasher: A bunch of good stuff this week: ModSecurity | Flash | InfoSec advice | SQLi | Stalker | ROPGuard https://t.co/xw9JPl1O[2012-08-14] - 18:17:05 - RT @yuange75: IIS5 0day http://t.co/zr85iplv[2012-08-14] - 18:17:05 - RT @codelancer: The Mystery of the Encrypted #Gauss Payload @Securelist http://t.co/JH2rJghY[2012-08-13] - 17:09:23 - RT @ntdebugging: .kill ProcessAddress - In a kernel debug, terminates the process when you hit g. #debug ^DN[2012-08-13] - 17:09:23 - RT @ponez: I updated blog post, this time using KERNELBASE unprotected functions, not Ny syscalls , PoC http://t.co/mcb3hiPO[2012-08-13] - 17:09:23 - RT @gentilkiwi: #mimikatz now *fully* compatible with Windows 8 / 2012 RTM (even the kernel driver !) - http://t.co/zJINQIl5[2012-08-08] - 12:00:53 - RT @instruder: http://t.co/LbPlAHQB cve2012-1876 win7+ie8 leak shellcode address
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|