invist

200 posts

invist banner
invist

invist

@invist

::

Katılım Mayıs 2016
385 Takip Edilen99 Takipçiler
invist retweetledi
/ˈziːf-kɒn/
/ˈziːf-kɒn/@x33fcon·
Oh wait, what did we find wrapping up? 🦏😁
/ˈziːf-kɒn/ tweet media/ˈziːf-kɒn/ tweet media
English
1
1
17
0
invist retweetledi
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
We could waffle on about our distinctive service portfolios. We could brag about the perks we provide. We could present you with our outstanding team. But you know what? Apply if you can! apply-if-you-can.com
English
4
10
21
0
invist retweetledi
frycos
frycos@frycos·
@frycos/searching-for-deserialization-protection-bypasses-in-microsoft-exchange-cve-2022-21969-bfa38f63a62d" target="_blank" rel="nofollow noopener">medium.com/@frycos/search… Blog post published with my special guest "Microsoft Exchange (CVE-2022-21969)"
English
7
184
461
0
invist retweetledi
thefLink
thefLink@thefLinkk·
Here is an idea to identify running beacons: 1. Beacons ThreadState often is: DelayExecution 2. Calltrace to NtDelayExecution includes unknown regions Works also fine against beacons sitting in file backed memory github.com/thefLink/Hunt-…
English
1
67
164
0
invist retweetledi
MOGWAI LABS GmbH
MOGWAI LABS GmbH@mogwailabs·
It seems that there is a lot confusion about the log4j JNDI injection vulnerability (CVE 2021-44228). In our latest blog post we provide additional background fundamentals about JNDI and JNDI exploitation (and a lot of links): mogwailabs.de/en/blog/2021/1…
English
3
38
114
0
invist retweetledi
MOGWAI LABS GmbH
MOGWAI LABS GmbH@mogwailabs·
RCCMD is a service that lets you systematically shut down critical systems in the event of a power outage. In our latest blogpost we show how systems can be compromised via this service: mogwailabs.de/en/blog/2020/0…
English
0
9
20
0
invist retweetledi
MOGWAI LABS GmbH
MOGWAI LABS GmbH@mogwailabs·
We just pushed a new MJET version with two small features that might be handy if you are dealing with some unusual targets. github.com/mogwailabs/mje…
English
0
6
11
0
invist retweetledi
thefLink
thefLink@thefLinkk·
github.com/thefLink/C-To-… Some examples on how to create complex PIC which uses syscalls in pure C. One can use any shellcode loader/injector to execute complex PIC and use encoders to break signatures.
English
0
4
10
0
invist
invist@invist·
@frycos @steventseeley Personally would also go with goharbor.io . If you don't need a full feature regsitry you can also serve the images via a webserver (docker save |bzip2 > s.bz2 ) and restore them via cat s.bz2 | bunzip2 | docker load. Hacky way but simple & ro
English
0
0
2
0
ϻг_ϻε
ϻг_ϻε@steventseeley·
What are my options for a private docker registry that allows me to give users read access only?
English
4
1
6
0
invist retweetledi
Alvaro Muñoz
Alvaro Muñoz@pwntester·
It is now official, @olekmirosh and yours truly will be presenting at @BlackHatEvents one more time! 🎉 #room-for-escape-scribbling-outside-the-lines-of-template-security-20292" target="_blank" rel="nofollow noopener">blackhat.com/us-20/briefing…
English
1
5
47
0
invist retweetledi
Hans-Martin Münch
Hans-Martin Münch@h0ng10·
MOGWAI LABS was founded 2 years ago. Due to Covid19, we will have no party. However, I booked several DJs to create some mixes instead. Starting with DJ Crypt from the Famous Deck Team who is showing his turntable skillz with this fine hiphop mix. Enjoy :) soundcloud.com/dj-crypt/2-yea…
English
2
8
30
0
invist retweetledi
ATT&CK
ATT&CK@MITREattack·
Our beta release of ATT&CK with sub-techniques is now live! We’ve just posted a blog post by @stromcoffee with links to all of the new resources and advice on how to leverage them (medium.com/mitre-attack/a…). You can also check out the new site itself at attack.mitre.org/beta/.
GIF
English
23
310
487
0