 |
Contribuez à SecuObs en envoyant des bitcoins ou des dogecoins.
Contribute to SecuObs by sending bitcoins or dogecoins.
|  |
|
|
|
|
|
|
| Mini-Tagwall | | | |
Revue de presse : security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone
+ de mots clés pour la revue de presse
Annuaires des videos : curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit
+ de mots clés pour les videos
Revue Twitter : security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall
+ de mots clés pour la revue Twitter
| | |
|
|
|
|
|
Les Tweets pour nicolasbrulez |
Si vous voulez bloquer un compte Twitter ou nous en proposer un
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
Les Tweets filtrés pour "nicolasbrulez" (370 résultats)S'abonner au fil RSS SecuObs pour le compte Twitter nicolasbrulez[2012-10-10] - 16:21:58 - RT @EdiStrosar: PinkiePie owns Chrome again: https://t.co/LCMwARQN #Pwnium[2012-10-09] - 14:11:35 - RT @quequero: Deobfuscating BlackHole V2 HTML Pages with Python: http://t.co/ACLFOV4A[2012-10-08] - 18:44:06 - RT @CERT_Polska_en: Honeynet Project releases version 3 of the Glastopf honeypot: http://t.co/t0N7I5ZI[2012-10-08] - 09:46:02 - RT @unixfreaxjp: #Dev #Coder #Paper: Securing Kernel Via Static Binary Rewriting, ProgramShepherding and Partial Control Flow Integrity ...[2012-10-08] - 09:46:02 - RT @volemacom: Another Opera 0day - SVG+XML Handling Vulnerability: http://t.co/6cMXUCaw[2012-10-08] - 09:46:02 - RT @blackthorne: Reverse Engineering Tools http://t.co/jjzDoBSe[2012-10-08] - 00:51:47 - RT @teamcymru: Cybercrime Gang Recruiting Botmasters for Large-Scale MiTM Attacks on American Banks http://t.co/JKWsJuEB[2012-10-08] - 00:51:47 - RT @C_64: ZX81 magazine Monochrome just released issue 3 as PDF http://t.co/WfI7RiGc #speccy #zx81[2012-10-06] - 09:28:22 - RT @ange4771: new OllyDbg 2.01g http://t.co/J5YdxdN6 - now correctly disassembles CorkaMIX (Grp 16, 0F 18 xx) http://t.co/0XtpCBFx[2012-10-06] - 09:28:22 - RT @Antelox: OllyDbg 2.01g - Major update: http://t.co/P12pWrQa[2012-10-03] - 18:17:57 - RT @aphesz: FINAL CALL for #HITB2012KUL Volunteers. Contact any HITB Crew for details or ping me. p/s: Must already be in KUL.[2012-10-02] - 14:17:52 - RT @codelancer: From a DDoS perspective, they are on the level of a Stuxnet type of attack http://t.co/cPMPbMlx O'RLY?[2012-09-30] - 18:58:31 - RT @aszy: Malware :: Installing Cuckoo Sandbox v4.2 on Ubuntu 12.04 LTS for Malware Analysis http://t.co/yTQ91sMj[2012-09-29] - 18:20:39 - RT @lostinsecurity @jaimeblascob just like the old days, IDA + OllyDBG :) - That should be the only way :-) Soft ICE for old days tho :P[2012-09-29] - 18:20:39 - RT @nmap Hakin9 Magazine's Nmap issue successfully trolled by security researchers http://t.co/TXJPJUqi - hahaha i get spammed too :)[2012-09-21] - 21:57:09 - RT @quequero: Importing Ollydbg Addresses into IDA: http://t.co/vbQsgieQ #RE[2012-09-20] - 19:51:36 - RT @e_kaspersky: Microsoft releases temp fix for the recent IE 0day vuln; promises an urgent update on Friday http://t.co/Ygj8uwp3[2012-09-19] - 21:18:12 - Reverse Engineering File infectors (viruses) as training exercice. Always fun :)[2012-09-18] - 21:55:47 - RT @Foundstone: New Blog Post: Simple Cross Site Scripting Vector That Webkit XSS Auditor Ignores http://t.co/kP1qBGiu[2012-09-17] - 23:39:20 - RT @real_redp: new in w8 undocumented way to call user-mode notifiers from kernel - WNF: http://t.co/mUjCA1Vy[2012-09-16] - 19:21:14 - RT @RolfRolles: Wading into Windows kernel reverse engineering for the first time. Way too easy with all of the symbols, documented type ...[2012-09-14] - 05:30:52 - RT @RobertMLee: Up now is Rodrigo @spookerlabs Montoro from @SpiderLabs speaking on detecting malicious files in PDFs. #SRCSea[2012-09-13] - 20:20:39 - RT @MicrosoftDCU: Microsoft disrupts #Nitol botnet and more than 500 additional strains of malware in latest operation http://t.co/S2I5KouG[2012-09-12] - 15:37:44 - Whitepaper on Banker Tinba http://t.co/oYEfD4Qg cc @peterkruse[2012-09-12] - 00:54:43 - @tks1t0 This time it was just counting on people to install something. In general keeping Java, Adobe * updated is a good start :)[2012-09-12] - 00:54:43 - RT @codelancer: Litvinenko's 'http://t.co/bXiCjPlt' was one of most famous malware DNS nameservers. Take a look http://t.co/T0DS5QRx[2012-09-11] - 03:23:07 - RT @DrM_fr: Protecting web service from botnet exploitations http://t.co/b2YXdSY1 #phd #thesis #botnets (via @aszy)[2012-09-11] - 03:23:07 - RT @Bd3j0ng: So many people asking me to fix their PC because of Live Security Platinum. Learn to use AV and to not use Java.[2012-09-10] - 11:13:29 - RT @Dinosn: Extracting EXE file (in HTTP stream) from captured packets file with Wireshark http://t.co/Wpj5FBHu[2012-09-07] - 20:48:50 - RT @Dinosn: DLL Injection and Windows 8 http://t.co/jasQLFzy[2012-09-07] - 20:48:50 - RT @TigzyRK: Anyone got a bootkit.sst dropper? (the one with the hidden partition) It's for a removal test with #RogueKiller (please RT)[2012-09-06] - 21:26:03 - @Tris_Acatrinei T'a des réductions chez amazon? :P cc @ClEmEnCf @m_c_scappa @gchampeau[2012-08-10] - 11:41:43 - RT @craiu: @botherder MD5s for Gauss can be found in our full (51 pages) paper. https://t.co/MzquIots[2012-08-07] - 13:53:34 - RT @VUPEN: Blog: Advanced Exploitation of Windows Kernel 64-Bit Sysret Vuln (MS12-042) on Win7 + Win 2008 R2 http://t.co/XKhsePuI #Shari ...[2012-08-07] - 13:53:34 - RT @elvanderb: Complete solution for ESET BlackHat US challenge : http://t.co/NlqjEjf4 (I hate blogger)[2012-08-05] - 14:11:36 - Little reverse engineering training session for @PascalBrulez :-)[2012-08-01] - 07:38:04 - RT @k_sec: Defcon is 20 Years Old in 2012 #Securelist http://t.co/NxOspKIM #defcon[2012-07-28] - 03:28:21 - RT @artem_i_baranov: Investigation an interesting kernel mode stealer http://t.co/PhjdRCcX #rootkit #malware #downloader #injector #stealer[2012-07-27] - 02:34:27 - @belowring0 @j0emccray 17 years old hacker will demonstrate Linux ELF Virus at 'The Hackers Conference 2012' So 10 years old[2012-07-27] - 02:34:27 - RT @mikko: Flame won a Pwnie: http://t.co/mTgf0MMXAny attack that requires a breakthrough in cryptography to pull off is pretty cool i ...[2012-07-24] - 19:31:24 - Regarding previous tweet, CTRL+K opens function stack, and renaming works there. Quick hack around the bug[2012-07-24] - 19:31:24 - RT @headhntr: Looks like someone is phishing #BlackHat attendees. I wonder where they got the attendee list from? - http://t.co/0V3z8JJk ...[2012-07-20] - 15:47:01 - RT @Saccaparami: ElcomSoft, Pico Computing show world's fastest password-cracking solution http://t.co/qEgkaAlp Oh great! #Encryption #F ...[2012-07-18] - 09:40:10 - @ap0x It's indeed pretty terrible. Obfuscation by Design tho cough cough ;-)[2012-07-18] - 09:40:10 - RT @DCITA: Dutch Police Takedown CCs Used by Grum Botnet http://t.co/YvtiNr47[2012-07-18] - 09:40:10 - Social engineering - Right to left override (RTLO) techniques used in the #Madi campaign[2012-07-18] - 09:40:10 - Among Social Engineering tricks used by the Trojan Downloader during the #Madi campaign, one video about Missile Test http://t.co/SH4Zjj5M[2012-07-11] - 08:58:10 - RT @soulseekah: Fast Image Comparison with Python :: http://t.co/gPYQ5EZ6[2012-07-11] - 08:58:10 - RT @SecMash: #InfoSec Most of What You've Read About DNSChanger Is Wrong. Here's How. http://t.co/ZsnrVSJk #Cybersecurity[2012-07-08] - 20:38:03 - New blog added: DNSChanger - Last Call on Cleanup http://t.co/ekWCcwOa #kaspersky #DNSChanger #Virus #infected[2012-07-07] - 17:08:36 - RT @hugo_glez: SYSRET 64-bit operating system privilege escalation vulnerability on Intel CPU hardware http://t.co/57v7nVkm exploiting h ...[2012-07-07] - 17:08:36 - New MacOS X backdoor variant used in APT attacks http://t.co/F2rwjYwB #OSX #APT #kaspersky
Menu > Elements de la revue Twitter : - l'ensemble [ tous] - par mots clé [ tous] - par compte [ tous] - le tagwall [ voir]
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|
|
|
|
|