 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Index filtré de tous les Tweets pour le terme win32 |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Index filtré des Tweets pour le terme win32 (73 résultats)S'abonner au fil RSS Twitter pour le terme win32[2012-09-27] - 09:49:19 - "Ivanlef0u" - RT @iMHLv2: New @volatility plugins for analyzing USER objects in kernel space and the win32k.sys gahti http://t.co/X9gTPYUF #dfir #malw ...[2012-09-21] - 22:01:34 - "th3j35t3r" - UPDATE: Malware was win32:VBCrypt-AFM - patched Windows users would be unaffected, If ur worried run MBAM, MacOS and Linux users are immune.[2012-09-07] - 05:51:39 - "hdmoore" - @vmamuaya you likely have the wrong target selected (java vs win32 native). Java targets need Java payloads[2012-07-20] - 10:32:37 - "hackerfantastic" - @simonroses thanks :-) it doesn't just look nice though, it'll own vulnerable win32, mac or linux with minimal configuration :-D[2012-06-16] - 17:48:06 - " Ivanlef0u" - RT @j00ru: There's nothing more enjoyable than finally finding a weekend to research some Windows internals :-) win32k 0days++[2012-05-12] - 06:13:16 - " dloss" - RT @tarek_ziade: watchdog is very useful - a portable inotify library in python (uses inotify or kqueue or some win32 api) - http://t.c ...[2012-03-20] - 02:38:10 - "Ivanlef0u" - RT @j00ru: @Ivanlef0u wow, impressive... for win32k.sys stack cookies, they probably could've used http://t.co/EPX1aw3X ;)[2012-03-13] - 15:32:30 - "exploitdb" - [shellcode] - win32 xp-sp3 beep and exitprocess shellcode 28 bytes: http://t.co/opjuB3cs[2012-03-05] - 09:54:51 - " Ivanlef0u" - RT @j00ru: win32k 0days++[2012-01-23] - 09:08:09 - "hdmoore" - @knickz0r maybe - we do that for win32 today, it might be time to formalize linux kernel post-exploitation[2011-12-21] - 11:13:56 - "craiu" - Yet another remotely exploitable win32k.sys kernel mode code execution vulnerability - http://t.co/TrdZ8nqw via @threatpost[2011-11-04] - 17:55:00 - "daveaitel" - RT @thegrugq: @kernelpool @jduck1337 pfft, OSX and Linux have had the ability to opt out of win32 for decade. Miscosoft - still pla ...[2011-11-04] - 11:18:19 - " hdmoore" - @rajats misread this question; java meterpreter is already outside of the sandbox, you can simply drop a win32 native meterpreter[2011-11-02] - 00:46:06 - "Ivanlef0u" - RT @NTarakanov: Intersting, Duqu uses some 0day from win32k.sys like Stuxnet does, or in other r0 vector #Duqu[2011-09-27] - 17:32:20 - "DumpAnalysis" - RT @Dinosn: Kernel Attacks through User-Mode Callbacks in win32k http://t.co/55WlaMBI[2011-09-27] - 15:20:41 - " adulau" - http://t.co/9wBKuz5X icmpsh is a simple reverse ICMP shell with a win32 slave and a POSIX compatible master in C, Perl or Python #infosec[2011-09-27] - 14:52:35 - "xanda" - RT @Dinosn: Kernel Attacks through User-Mode Callbacks in win32k http://t.co/55WlaMBI[2011-09-27] - 14:52:35 - "xanda" - RT @adulau: http://t.co/9wBKuz5X icmpsh is a simple reverse ICMP shell with a win32 slave and a POSIX compatible master in C, Perl or P ...[2011-09-27] - 14:44:11 - "xme" - RT @adulau: http://t.co/9wBKuz5X icmpsh is a simple reverse ICMP shell with a win32 slave and a POSIX compatible master in C, Perl or P ...[2011-09-27] - 13:22:30 - "opexxx" - RT @adulau: http://t.co/9wBKuz5X icmpsh is a simple reverse ICMP shell with a win32 slave and a POSIX compatible master in C, Perl or P ...[2011-09-27] - 09:26:28 - " jaysonstreet" - RT @adulau: http://t.co/9wBKuz5X icmpsh is a simple reverse ICMP shell with a win32 slave and a POSIX compatible master in C, Perl or P ...[2011-09-27] - 08:58:40 - " donicer" - RT @devilok: Kernel Attacks through User-Mode Callbacks in win32k http://t.co/xRhzaTc0[2011-09-27] - 07:34:47 - "devilok" - Kernel Attacks through User-Mode Callbacks in win32k http://t.co/xRhzaTc0[2011-09-27] - 05:25:08 - " FlUxIuS" - RT @devilok: Kernel Attacks through User-Mode Callbacks in win32k http://t.co/xRhzaTc0[2011-08-04] - 07:59:25 - "PwnieAwards" - Best privilege escalation: tarjei win32sys[2011-08-02] - 11:27:37 - "mubix" - RT @egyp7: Metasploit Framework 4.0! http://t.co/k9sQ4VZ - 20 new exploits; 14 new post mods; java/win32/posix meterpreter improvements[2011-08-02] - 05:03:31 - "ToolsWatch" - RT @hdmoore: RT @egyp7: Metasploit Framework 4.0! http://t.co/k9sQ4VZ - 20 new exploits; 14 new post mods; java/win32/posix meterpreter ...[2011-08-02] - 05:02:05 - "egyp7" - Metasploit Framework 4.0! http://t.co/k9sQ4VZ - 20 new exploits; 14 new post mods; java/win32/posix meterpreter improvements[2011-08-02] - 05:00:41 - "Carlos_Perez" - RT @egyp7: Metasploit Framework 4.0! http://t.co/k9sQ4VZ - 20 new exploits; 14 new post mods; java/win32/posix meterpreter improvements[2011-08-02] - 03:42:30 - "hdmoore" - RT @egyp7: Metasploit Framework 4.0! http://t.co/k9sQ4VZ - 20 new exploits; 14 new post mods; java/win32/posix meterpreter improvements[2011-08-02] - 02:10:45 - " _sinn3r" - RT @egyp7: Metasploit Framework 4.0! http://t.co/k9sQ4VZ - 20 new exploits; 14 new post mods; java/win32/posix meterpreter improvements[2011-08-02] - 02:10:08 - " Roni_Bachar" - RT @egyp7: Metasploit Framework 4.0! http://t.co/k9sQ4VZ - 20 new exploits; 14 new post mods; java/win32/posix meterpreter improvements[2011-08-02] - 01:10:36 - " matrosov" - RT @egyp7: Metasploit Framework 4.0! http://t.co/k9sQ4VZ - 20 new exploits; 14 new post mods; java/win32/posix meterpreter improvements[2011-08-02] - 00:14:43 - "EdiStrosar" - RT @egyp7: Metasploit Framework 4.0! http://t.co/k9sQ4VZ - 20 new exploits; 14 new post mods; java/win32/posix meterpreter improvements[2011-08-02] - 00:14:26 - "corelanc0d3r" - RT @egyp7: Metasploit Framework 4.0! http://bit.ly/rauMvS - 20 new exploits; 14 new post mods; java/win32/posix meterpreter improvements[2011-08-02] - 00:06:41 - " Trancer00t" - RT @egyp7: Metasploit Framework 4.0! http://t.co/k9sQ4VZ - 20 new exploits; 14 new post mods; java/win32/posix meterpreter improvements[2011-07-20] - 00:52:33 - "teamcymru" - MoonSols DumpIt: win32dd+win64dd simple exe to copy physical memory for USB key #forensics #lawenforcement http://bit.ly/qxCTTW[2011-07-18] - 19:54:38 - "hacktalkblog" - New Exploit [shellcode] - win32/PerfectXp-pc1/sp3 (Tr) Add Admin Shellcode 112 bytes: http://bit.ly/q88u7p #Exploit[2011-07-18] - 19:26:18 - "exploitdb" - [shellcode] - win32/PerfectXp-pc1/sp3 (Tr) Add Admin Shellcode 112 bytes: http://bit.ly/nsBs3z[2011-07-10] - 13:38:03 - "endrazine" - RT @f3e7xxx: How to get DNS cache from Windows API ( http://t.co/89lTRfr) #win32 #coding[2011-07-07] - 12:19:33 - "theprez98" - @x0red can't start the openvpn service after install because of a problem with the tap-win32 adapter. Win7 doesn't like the driver.[2011-06-29] - 06:50:42 - "pentestit" - Wireshark 1.2.18 is now available - wireshark-win32-1.2.18.exe - http://t.co/G0uFiqj[2011-06-21] - 06:16:00 - "egyp7" - @AcidRampage Kinda. Linux meterpreter is incomplete but some things work. you can use 'sessions -u' to upgrade a win32 shell to meterpreter[2011-05-22] - 02:56:15 - " jduck1337" - @securitea win32_remote.exe, linux_server, etc.. IDA's remote debuggers[2011-05-02] - 16:28:05 - "komeilipour" - win32/xp sp3 StarWars Movie Shellcode 74 bytes http://goo.gl/vZPVq #Security[2011-05-02] - 05:40:46 - "komeilipour" - win32/xp sp3 cmd.exe Shellcode 50 byteshttp://goo.gl/g9T3b #Security[2011-05-02] - 05:40:46 - "komeilipour" - win32/xp sp3 #Windows Magnifier Shellcode 52 bytes http://goo.gl/KIQjC #Security[2011-05-02] - 05:40:46 - " komeilipour" - win32/xp sp3 Shutdown #Windows Shellcode 56 Bytes (30sec Timer) http://goo.gl/J2I6A #Security[2011-04-28] - 00:14:40 - "komeilipour" - win32/xp sp3 MSPaint Shellcode 52 Bytes http://goo.gl/utqEQ #Security[2011-04-27] - 15:38:26 - " komeilipour" - win32/xp sp3 Activate Guest Account Shellcode 67 Bytes http://goo.gl/w4hDQ #Security[2011-04-27] - 15:25:59 - "pentestit" - RT @komeilipour: win32/xp sp3 Activate Guest Account Shellcode 67 Bytes http://goo.gl/w4hDQ #Security[2011-03-12] - 13:10:07 - "hdmoore" - @mahesh557 @jadedsecurity hes been involved with Metasploit for a long time, reflective dll injection, vpn pivoting, win32 payload hashes...
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|