Tamil Mathi (@hash_byte) 's Twitter Profile
Tamil Mathi

@hash_byte

Security @ BD | Speaker @ Bsides | DEF CON | OffensiveX | OSCP

ID: 745137282814881793

linkhttps://medium.com/@tamilmathi_maddy_tamilthurai calendar_today21-06-2016 06:12:27

26 Tweet

32 Followers

323 Following

Vincent Le Toux (Paris, France) (@mysmartlogon) 's Twitter Profile Photo

Magic #2: How the hacker can shutdown your 🪄🪄 next gen/IA Active Directory monitoring when your AD has been compromised in one command ? Just by putting the IP of the platform in lDAPIPDenyList for an immediate shutdown. Fun part: it replicates 🤣

Magic #2:
How the hacker can shutdown your 🪄🪄 next gen/IA Active Directory monitoring when your AD has been compromised in one command ?
Just by putting the IP of the platform in lDAPIPDenyList for an immediate shutdown.
Fun part: it replicates 🤣
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1995: Mudge published "How to Write Buffer Overflows", one of the first papers about buffer overflow exploitation. Then Mudge sent a copy to ℵ₁ @[email protected], who wrote "Smashing the Stack For Fun and Profit" in 1996. Seminal paper to seminal paper. Mudge's: insecure.org/stf/mudge_buff…

1995: Mudge published "How to Write Buffer Overflows", one of the first papers about buffer overflow exploitation. Then <a href="/dotMudge/">Mudge</a> sent a copy to <a href="/aleph_one/">ℵ₁ @aleph_one@infosec.exchange</a>, who wrote "Smashing the Stack For Fun and Profit" in 1996. Seminal paper to seminal paper. Mudge's: insecure.org/stf/mudge_buff…
Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

A phishing campaign tries to evade detection by dividing its attachment into code segments and encoding them using various mechanisms. It’s like a jigsaw puzzle that only reveals its malicious intent once all pieces are combined and decoded. Details: msft.it/6019nLKsX

A phishing campaign tries to evade detection by dividing its attachment into code segments and encoding them using various mechanisms. It’s like a jigsaw puzzle that only reveals its malicious intent once all pieces are combined and decoded. Details: msft.it/6019nLKsX
Jean (@jean_maes_1994) 's Twitter Profile Photo

ever wanted to fake sign a binary, but didn't want to install additional dependencies? well now you can using my super 1337 automation github.com/jfmaes/LazySign this tool was very hard to create, I swear! I may or may not have been inspired by Conti.

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Elevate your cmd.exe to LOCAL_SYSTEM? \\live.sysinternals.com\tools\PsExec.exe -s -c cmd.exe Have you ever seen this being used by an adversary? I haven't but I like it.

Elevate your cmd.exe to LOCAL_SYSTEM? 

\\live.sysinternals.com\tools\PsExec.exe -s -c cmd.exe

Have you ever seen this being used by an adversary? I haven't but I like it.
Wiz (@wiz_io) 's Twitter Profile Photo

🚨 BREAKING: History written with just 9 lines of code! We've discovered #PyLoose, the FIRST documented Python-based fileless attack targeting cloud workloads. See the power of 9 lines of Python code below 👇🏽

🚨 BREAKING: History written with just 9 lines of code! 

We've discovered #PyLoose, the FIRST documented Python-based fileless attack targeting cloud workloads. 

See the power of 9 lines of Python code below 👇🏽