 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| |
|
|
|
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour " espreto" (437 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter espreto[2012-10-05] - 05:32:28 - ?@getpy: Create *beautiful* command-line interfaces with Python, a presentation by @keleshev at PyCon UK 2012: http://t.co/YphqMcMK?[2012-09-28] - 15:27:30 - ?@bdcht: Unusual firewall bypassing techniques, network and computer security : http://t.co/SmewXG7h? - Cool![2012-09-28] - 15:27:30 - ?@TheHackersNews: True -- @nikcub: it's only an XSS, a lot of people underestimate how easy it is to get someone to click on something?[2012-09-27] - 10:54:54 - ?@infosecmafia: TOR connection to a VPN = OK .. VPN connection to TOR = GOTO JAIL -- LOL? -- opsec is cool! o/[2012-09-27] - 10:54:54 - ?@fnando: Notas de rodapé da imagem anterior http://t.co/7MXeay3x? - item 8 foi foda dmais! Huauaah[2012-09-21] - 00:06:03 - ?@Carlos_Perez: Simple meterpreter script for running powershell commands or scripts https://t.co/WIAxNFpu #metasploit #PowerShell?[2012-09-18] - 03:05:02 - ?@vuln_: #CVE-2012-3524 libdbus 'DBUS_SYSTEM_BUS_ADDRESS' Variable Local Privilege Escalation Vulnerability - http://t.co/ylH15GX2?[2012-09-18] - 03:05:02 - ?@ChrisJohnRiley: [SuggestedReading] DNS tunneling for Metasploit now open source http://t.co/fYLQ1HpI?[2012-09-18] - 03:05:02 - ?@BorjaMerino: Fuzzing Like A Boss with Pythonect http://t.co/2ZZ5zp2y?[2012-09-08] - 00:16:14 - ?@getpy: Interactive textbooks for learning Python: http://t.co/YxjS0wnC?[2012-09-07] - 01:18:42 - ?@agent0x0: RT @SecureState: Burp Series: Efficient Use of Payload Options When Attacking HTTP Basic Authentication http://t.co/dUXYhTJ6?[2012-09-07] - 01:18:42 - ?@_pr0n_: JSFuck - Write any JavaScript with 6 Characters - http://t.co/OIwck4CF?[2012-09-07] - 01:18:42 - RT @secureideas: Please explain why NoScript is on Backtrack? Do people actually use BT to surf the web normally? All it does it get in ...[2012-09-07] - 01:18:42 - RT @pauldotcom: RT @daveaitel: So I'm going to proactively ask who's End User Security Training protects against that Java bug tomorrow ...[2012-09-07] - 01:18:42 - ?@jstorimer: Creating Your First Daemon Process in Ruby - http://t.co/nX6laQLN?[2012-09-07] - 01:18:42 - ?@conviso: Apresentação de trabalhos no OWASP Floripa Day http://t.co/Qpxmj5JB?[2012-08-18] - 08:52:49 - Webdav damn![2012-08-18] - 08:52:49 - ?@SecurityTube: [Video] Sqlmap Plugin With burpsuite http://t.co/SFwQlcY4?[2012-08-13] - 19:36:20 - ?@Dinosn: Shellcode sizes in Metasploit http://t.co/Rf3hp22C?[2012-08-10] - 15:47:40 - Someone already worked with the solution Juniper vGW Virtual Gateway?[2012-07-26] - 06:15:06 - HackArmoury.com - A Pentesticles Project! http://hackarmoury.com/ ~ Cool![2012-07-26] - 06:15:06 - Opening closed ports on NAT device and bypassing stateful firewalls with BeEF http://bit.ly/QoxfJY[2012-07-11] - 13:53:56 - ?@ericktedeschi: Ae sim... Metasploit rodando lindo no iPad 2 by @espreto http://t.co/JuUS2km7? ~ o/[2012-07-09] - 01:37:27 - RT @Carlos_Perez: For those that use my Metasploit Pentest plugin I just updated it with the latest post and scanner modules http://t.co ...[2012-07-09] - 01:37:27 - ?@hiddenillusion: Interesting look at Windows 8.3 file names from a pentest stand point : http://t.co/otVYsULw?[2012-06-26] - 03:36:42 - ?@beefproject: BeEFy Desserts! The final installment of BeEF in a real world pentest is up! http://t.co/JqvmCxcY?[2012-06-25] - 09:47:50 - ?@mubix: RT @HECFBlog: Hak5 did a 30min documentary on NCCDC http://t.co/gBwdVAs7?[2012-06-25] - 09:47:50 - ?@ChrisJohnRiley: [SuggestedReading] XSS: Gaining access to HttpOnly Cookie in 2012 http://t.co/PCZxq7ZK?[2012-06-24] - 07:44:42 - ?@CiscoSecurity: [Whitepaper] Understanding SQL injection: http://t.co/KMfIsiLJ [Example of authentication bypass included]?[2012-06-24] - 07:44:42 - Fell beer in my book about python. I think now, the codes came out alcoholics. #nevertakebeernearyourbookshelf.[2012-06-22] - 10:55:14 - ?@n00bznet: I love exploring functionality in Metasploit. It is so much more than /exploit/ https://t.co/Uu7dXbcF?[2012-06-20] - 07:00:57 - ?@r0bertmart1nez: @opexxx: Recommended: Python tools for penetration testers http://t.co/9OnQaL7a?[2012-06-20] - 07:00:57 - ?@pentestit: Facebook - Remote Post SQL Injection PoC - http://t.co/qxkXl0as?[2012-06-20] - 07:00:57 - RT @jerryhoff: I'm doing a free webinar tomorrow on securing the SDLC - https://t.co/MVICZsEd The slides will be the basis for an upcom ...[2012-06-16] - 02:38:58 - ?@carnal0wnage: [Shared Reader] PowerSploit - New Feature: Inject-Shellcode now supports Metasploit HTTP[S] payloads http://t.co/PE9duC77?[2012-06-15] - 10:12:26 - ?@eromang: New blog post: MS12-005 Microsoft Office ClickOnce Vulnerability Metasploit Demo http://t.co/8UYKRcHK #zataz #infosec?[2012-06-15] - 10:12:26 - ?@jcran: RT @hdmoore: 64-bit Ubuntu/Debian/Arch are confirmed vulnerable to the MySQL auth bypass. 32-bit looks like no, still much testing?[2012-06-15] - 10:12:26 - RT @antisnatchor: ?@jcran: Setting up a dev enviroment for metasploit in Netbeans IDE: http://t.co/pL8FOKr1 #handy /via @manils @kernels ...[2012-06-15] - 10:12:26 - ?@beefproject: Part 3 of using BeEF in a real world pentest has been published! Come get your Hot BeEF Steak! http://t.co/eYlVEBlU?[2012-06-15] - 10:12:26 - ?@antisnatchor: Awesome explanation of the Sergey UXSS that leaded to code exec on Chrome by @scarybeasts - http://t.co/B6EtWQnS?[2012-06-15] - 10:12:26 - ?@achillean: 61% of MySQL servers on Shodan allow remote connections (out of 633,356) http://t.co/BrMdRRDE?[2012-06-15] - 10:12:26 - ?@sqlmap: Our paper Data Retrieval over DNS in SQL Injection Attacks can be found here, http://t.co/mnreEWRV?[2012-06-15] - 10:12:26 - ?@eromang: New blog post: MS12-037 Internet Explorer Same ID Vulnerability Metasploit Demo http://t.co/3I9rJ7DN #zataz #infosec?[2012-06-15] - 10:12:26 - ?@mubix: #SharedLinks SSH Tricks And More! Presented By Kyle Young [GR-ISSA] (4-20-12) http://t.co/26Zdlkkb?[2012-06-15] - 10:12:26 - ?@Security_FAQs: RT @RealSecurity: Setting Up Your Own Virtual Pentest Lab http://t.co/Mjjn3ibo @wh33lhouse ? ~ well explained![2012-06-15] - 10:12:26 - ?@getpy: Exploring Python Using GDB, by @ebroder on the @stripe blog: http://t.co/3YHSmEnW?[2012-06-02] - 02:17:35 - ?@antisnatchor: Nice XSS intro article. They also use @beefproject in their demos http://t.co/dKw9tvQM via @InterN0T? ~~ cool[2012-06-02] - 02:17:35 - ?@stamparm: Slides for my PHDays 2012 talk DNS exfiltration using sqlmap can be found here: http://t.co/SLzr886Y?[2012-05-30] - 10:04:27 - ?@cgrassi: USB Programming with Ruby? http://t.co/eBi29hg5 #USB #ruby? (via @postmodern_mod3 )[2012-05-30] - 10:04:27 - RT @wisqnet: #Ruby programmers: STOP DISABLING #SSL PEER VERIFICATION! You are defeating the entire purpose of SSL. Learn it. Use it! ...[2012-05-26] - 23:15:48 - ?@nikcub: If anybody is interested I just created a fake Yahoo Axis chrome extension, signed it and pushed to github: https://t.co/rvj4qL66?[2012-05-26] - 23:15:48 - ?@mubix: #SharedLinks Automating SQLMap with data from wapiti http://t.co/ne0ojgg8?
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|