pentestmonkey 리트윗함PortcullisLabs@portcullislabs·11 TemNew release from the team, @pentestmonkey has ported udp-proto-scanner to Python and given it a bit of a polish: github.com/CiscoCXSecurit…번역 English013172.8K2
pentestmonkey 리트윗함PortcullisLabs@portcullislabs·25 TemWe did a thing! It's over 10 years since we started working on this but it's still useful today: github.com/CiscoCXSecurit… Kudos to @pentestmonkey for porting the Perl bits to a modern language. #aix #solaris #linux #unix #security번역 English3224813.8K15
pentestmonkey 리트윗함Kevin Robertson@kevin_robertson·10 Tem[Blog] Beyond LLMNR/NBNS Spoofing - Exploiting Active Directory-Integrated DNS blog.netspi.com/exploiting-adi… Also, #PowerShell ADIDNS spoofing functions added to Powermad github.com/Kevin-Robertso…번역 English10189288021
pentestmonkey 리트윗함Dominic Chell 👻@domchell·18 HazCongrats to @nmonkee @iantshaw @alexjplaskett and all the team at @mwrinfosecurity on their acquisition by @FSecure globenewswire.com/news-release/2…번역 English07270
pentestmonkey@pentestmonkey·31 MarBen Heck's staring a new youtube channel. I was a huge fan of the Ben Heck Show. youtu.be/5WlRm-ghuoA번역YouTube English00201
pentestmonkey 리트윗함Wezmaster@wezmaster·5 OcaAD ACL Scanner. A tool with GUI used to create reports of access control lists (DACLs) and system access control lists (SACLs) in Active Directory github.com/canix1/ADACLSc…번역 English042440
pentestmonkey 리트윗함Will Schroeder@harmj0y·30 EkiSo excited - here's my updated "Guide to Attacking Domain Trusts" posts.specterops.io/a-guide-to-att… ! Was a blast to write번역 English12589937028
pentestmonkey 리트윗함x0rz@x0rz·10 EkiGetting command execution on MSWord without any Macros 😈 sensepost.com/blog/2017/macr… #windows #maldoc #malware번역 English1554380001
pentestmonkey 리트윗함sqlmap@sqlmap·10 EkiHappy to announce that the sqlmap project has been sponsored by @netsparker web application security scanner번역 English224960
pentestmonkey 리트윗함NCSC UK@NCSC·7 EkiCyber security community! Opportunity to contribute to the foundations of the future cyber security profession ncsc.gov.uk/blog-post/cybe…번역 English245390
pentestmonkey 리트윗함Niek Timmers@tieknimmers·2 EkiOur paper about Escalating Privileges in Linux using Fault Injection is available online: riscure.com/publication/es… ! @pulsoid #FDTC17번역 English2991470
pentestmonkey 리트윗함Binni Shah@binitamshah·2 Marawesome-windows-domain-hardening : Curated list of awesome Security Hardening techniques for Windows: github.com/PaulSec/awesom… cc @PaulWebSec번역 English01302490
pentestmonkey 리트윗함Hak5@Hak5·25 ŞubOur launch event for the #BashBunny will be March 2nd, 8pm. More info and RSVP here! goo.gl/forms/3d7mkK6e…번역 English313390
pentestmonkey 리트윗함NCC Group plc@NCCGroupplc·25 ŞubA step by step guide on how to decrypt SCOM “RunAs” Credentials nccgroup.trust/uk/about-us/ne…번역 English0550
pentestmonkey 리트윗함b33f | 🇺🇦✊@FuzzySec·17 EkiFuzzySec -> Anatomy of UAC Attacks - fuzzysecurity.com/tutorials/27.h…번역 English376700
pentestmonkey 리트윗함Chris Nickerson@indi303·28 EylTO ALL in InfoSec who overuse Advanced. "It is in the flawless execution of the basics that we find world class success." - Lombardi번역 English338550
pentestmonkey 리트윗함Florian Roth ⚡️@cyb3rops·2 HazMcAfee SiteList.xml AD privilege escalation > should be part of every priv esc checklist > ICYMI like me github.com/tfairane/HackS…번역 English160610
pentestmonkey 리트윗함Piotr Kijewski@piotrkijewski·14 NisNice set of posts on a threat hunting reference model proposal blog.sqrrl.com/the-cyber-hunt… blog.sqrrl.com/the-threat-hun… blog.sqrrl.com/the-threat-hun…번역 English018240
pentestmonkey 리트윗함WithSecure Labs@FSecureLabs·12 NisAnother @metasploit module from @ukstufus, for storing groups, computers and user memberships from AD in a SQLite DB github.com/rapid7/metaspl…번역 English0970
pentestmonkey@pentestmonkey·14 NisView RDP session from pcap (and private key). Amazing work @CTXIS. Thank you for sharing. contextis.com/resources/blog…번역 English124300