|
Les Tweets pour emiliengirault |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "emiliengirault" (284 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter emiliengirault[2012-09-07] - 19:25:48 - Just released Google Play Unofficial Python API https://t.co/94adDwEy[2012-08-02] - 10:05:29 - RT @quarkslab: L'ESIEA et @quarkslab lancent 2 formations pro et diplômantes sur l'année, une en pentest, une en reverse: http://t.co/eM ...[2012-07-16] - 03:18:30 - RT @punter_infosec: Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers http://t.co/tK ...[2012-07-07] - 15:51:54 - AIDE : Android Java IDE https://t.co/45CwThA6[2012-06-26] - 18:38:22 - Decrypt GPP passwords within a Meterpreter session http://t.co/AGhuuc1Q // thx @trolldbois[2012-06-20] - 03:07:43 - Moteur de recherche d'articles MISC / Linux Magazine http://t.co/TM7Lv0pS[2012-06-15] - 06:24:48 - RT @ashutoshmehra: A nice detailed account of the Intel SYSRET privilege escalation vulnerability. http://t.co/5nZAirBj[2012-06-15] - 06:24:48 - RT @stripe: How to explore (and patch!) a Django app using GDB: https://t.co/qMVIRqjc[2012-06-13] - 22:41:09 - RT @delroth_: http://t.co/u8xiaBnk Intel CPU bug allows for local privilege escalation on 64 bit Windows, FreeBSD and Xen (Linux not imp ...[2012-06-09] - 00:35:54 - RT @Myst3rie: Tool for decompiling python bytecode https://t.co/zKGK20FC #sstic[2012-06-07] - 14:13:54 - Aime bien le concept d'IDS PCI Express. À quand des règles Snort? :) #SSTIC[2012-06-04] - 18:51:00 - De retour à Paris. SSTIC en fin de semaine, puis HIP/NDH. Décidement, le mois de juin est très productif :)[2012-05-11] - 16:48:33 - RT @newsoft: Single-stepper dans du bytecode Java depuis Eclipse, sans avoir le code source ? C'est possible :) http://t.co/jpNggXUo[2012-04-20] - 04:37:39 - RT @elvanderb: Finally, after 12 days and ~2700 lines of python, I managed to break the #SSTIC challenge o/. It's really a great chall ...[2012-04-17] - 16:51:20 - WinAppDbg: Scriptable Windows debugger module in Python, supporting API hooking http://t.co/VQyW35KL[2012-04-14] - 19:32:04 - Cesar Cerrudo easy kernel exploitation: set one object's ACL (such as lsass process) to NULL[2012-04-02] - 22:59:14 - Viens de réserver mon billet pour le SSTIC o/[2012-03-24] - 01:01:52 - RT @sstic: Le challenge SSTIC 2012 est en ligne, tous à vos claviers et bon week-end :) - http://t.co/WVxkLaIg[2012-03-12] - 10:27:55 - RT @ogrisel: Awesome: arbitrary python code injection in running processes with @lmacken's pyrasite http://t.co/yRdlSXOy #heapdump #moni ...[2012-02-27] - 15:39:27 - RT @aszy: Opcodes' Tables of Android, Java, .Net, x86 and x64 http://t.co/51D80ZQT[2012-02-01] - 23:21:53 - Useful Metasploit pentest.rb plugin https://t.co/1TzaWvtS - howtos: http://t.co/ME9hTdF2 and http://t.co/mI6QKjRP[2012-01-27] - 16:42:06 - RT @elvanderb: exploit this to execute native code in python : exec((lambda x:x).func_code.__class__(0,0,0,0,x91x03x30dx37x13,(), ...[2012-01-18] - 15:54:02 - Unicode in Python, demystified http://t.co/5oe3940D[2011-12-26] - 11:41:13 - RT @MISCRedac: #miscmag : spécial Putain 10 ans, avec un dossier sur le social engineering, apache killer, les mdp win, la géloc sur ...[2011-12-20] - 18:02:42 - Easily filter Nessus reports: xpath -q -e //ReportHost[@name='']/description/text() report.nessus[2011-12-17] - 17:37:34 - @adesnos Sometimes /dev/mem has restrictions -- only BIOS or PCI space (CONFIG_STRICT_DEVMEM), or doesn't even exist https://t.co/Q34RRaRo[2011-12-17] - 17:37:34 - @trufae Yes, but the idea was to be able to dump RAM without recompiling the kernel, or even rebooting. Pretty much like Win32dd on Windows.[2011-12-17] - 17:37:34 - @adesnos I don't think so, this is a kernel limitation (http://t.co/GLBBGTw0)[2011-12-17] - 02:34:50 - Can't dump RAM using /dev/mem on recent Linux kernels? fmem tool creates /dev/fmem readable with no restriction http://t.co/jcSMntQf[2011-11-25] - 12:51:57 - Server with 65535 TCP ports open, useful for firewall pentesting http://t.co/AVqv5FxD[2011-11-17] - 21:58:12 - Nessus API Specification http://t.co/3ypEFPvd[2011-11-17] - 13:59:37 - Zim : A desktop wiki useful for pentesters http://t.co/zanNlxXe[2011-11-14] - 02:18:42 - RT @nono2357: spynner, a wonderful Python-scriptable browser with full Javascript support! http://t.co/qK6GDZvC[2011-11-04] - 22:58:21 - RT @virtualabs: Y'a bon les hashes MD5 du RIPE NCC ! http://t.co/5vGofDUT #openbar[2011-11-02] - 13:23:05 - DoS SSL et contremesures http://t.co/ueGqOQub[2011-11-01] - 12:06:47 - RT @ProjectHoneynet: Android Reverse Engineering (A.R.E.) Virtual Machine available for download now!: The Honeynet Project is happy ... ...[2011-10-27] - 11:42:18 - Le nouveau MISC est dans les bacs. Les articles sur Python et l'architecture x86 ont l'air bien sympa.[2011-10-12] - 09:11:16 - RT @NES_SecurityLab: Bypassing Windows 7 kernel ASLR : http://t.co/Ez6hxTMR[2011-10-06] - 16:59:46 - Apache reverse proxy bypass http://t.co/yuGXHTYk http://t.co/PDaM8xdE[2011-09-21] - 16:16:11 - RT @shell_storm: Repository challenge Hack.lu http://t.co/zgMniXG6 #CTF[2011-09-14] - 14:59:42 - USBDeview : view all installed / connected devices on your system http://t.co/VSSHd6f[2011-09-10] - 05:21:49 - Hack.lu talk agenda http://t.co/sOb7UHf[2011-09-08] - 21:36:53 - Stuxnet vs Volatility http://t.co/q4eyj6w[2011-09-02] - 20:58:53 - RT @JonathanSalwan: ROPgadget v3.1 in progress | Feature: make auto ROP for bind shellcode #ROPgadget[2011-09-02] - 20:58:53 - RT @NES_SecurityLab: RT: @axcheron: Detecting Hardware Keyloggers http://t.co/nc544G2 #HITB[2011-09-02] - 20:58:53 - Nice tools for detecting and containing Conficker http://t.co/wbkOjXx - Honeynet's paper: http://t.co/QBiNpjt[2011-09-01] - 18:16:38 - Don't Drop the SOAP - Real World Web Service Pentesting http://t.co/6DNJzsb[2011-08-31] - 13:03:41 - andLinux : Run Linux natively inside Windows http://t.co/K1JWiu1[2011-08-29] - 18:28:44 - RT @mattifestation: My latest blog post: Targeted Heap Spraying ? 0x0c0c0c0c is a Thing of the Past http://t.co/zJTIyfj Enjoy![2011-08-18] - 14:58:26 - USB Made Simple http://t.co/Vo2qP0d[2011-08-17] - 02:03:49 - RT @__fastcall: Excellent Windows Kernel exploitation tutorial series by @Xst3nZ at http://t.co/HR75fk0.[2011-08-12] - 20:43:03 - RT @routardz: Defcon 19 CTF Castle write-up: http://t.co/XyfukSr
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|