π
³π
΄π
΅ππ
΄π
²π
½ππ
°πππ
°π
²π
Ί
@defsecnsattack
Followers
1K
Following
527
Media
130
Statuses
3K
#CyberSecurity #Defense #Attack #Offensive #Forensics #Osint #BlueTeam #RedTeam #PenTesting
CyberSecurity Expert
Joined December 2014
Misp project created a dedicated Misp instance to share information: https://t.co/9YdPVv8HEU ask them by DM the access. #COVID19 dedicated MISP
We have a dedicated MISP to share information about #COVID2019
https://t.co/64bWDpZAKr - If you want access DM us on Twitter.
1
4
9
With all these computer security conferences getting canceled, security professionals may actually be forced into securing computers.
12
83
498
SMBv3 Compression Tester Multiple scripts and detection tools to check if a Windows machine has SMBv3 protocol enabled with the compression feature. Our NSE script is based on smb2-capabilities.nse but we will PR the nmap repository with those changes. https://t.co/gNgcZr6U8r
github.com
CVE2020-0796 SMBv3 RCE. Contribute to claroty/CVE2020-0796 development by creating an account on GitHub.
0
6
8
PERCHΓ serve lβisolamento sociale. Il mio piccolo contributo (con il Lego come al solito π
)
13
148
379
π¬"PRACTICAL THREAT HUNTING: DEVELOPING AND RUNNING A SUCCESSFUL THREAT HUNTING PROGRAM" by @arpanrvl and @washalsec πͺ π[SLIDES]: https://t.co/7glzsSzDT2
#ThreatHunting #blueteam #mitre #sacon
2
42
143
AggressorScripts Disclaimer: These scripts are to help you audit your machines or machines you're authorized to audit. https://t.co/TGqXSXqvcz
github.com
Contribute to ramen0x3f/AggressorScripts development by creating an account on GitHub.
0
1
5
This tool is intended for penetration testers who want to perform an engagement quickly and efficiently. While this tool can be used for more covert operations (including some additions below), it really shines when used at the scale of a large network. https://t.co/SKbzDGcL14
github.com
A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB, plus now with a user hunter - Raikia/CredNinja
0
1
3
PowerExfil A collection of custom data exfiltration scripts for Red Team assessments. https://t.co/0PcgKRIu8J
github.com
A collection of data exfiltration scripts for Red Team assessments. - 1N3/PowerExfil
0
0
0
VB2019 paper: Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation-state adversary https://t.co/MCjGLJswH3
0
0
0
Threat Dragon is a free, open-source, cross-platform threat modeling application including system diagramming and a rule engine to auto-generate threats/mitigations. It is an OWASP Incubator Project. integration with other development lifecycle tools. https://t.co/KobUWaLjBr
github.com
An installable desktop variant of OWASP Threat Dragon - mike-goodwin/owasp-threat-dragon-desktop
0
2
9
Evasion techniques - Malware Evasion Encyclopedia, which contains over 50 techniques used by various malwares to detect virtualized and sandboxed environments. https://t.co/XHOEkxC7Qt
0
0
1
Intelligence operation against targets in Indonesia βC:\Windows\System32\rundll32.exeβ shell32.dll,ShellExec_RunDLL regsvr32 /s C:\ProgramData\pubpool.dll /i:process104.dll βC:\WINDOWS\system32\regsvr32.exeβ /s C:\ProgramData\pubpool.dll /i:process104.dll https://t.co/GJjrO13HrS
0
1
1
The ADTimeline script generates a timeline based on Active Directory replication metadata for objects considered of interest. Replication metadata gives you the time at which each replicated attribute for a given object was last changed. https://t.co/aQcTgxDD3P
github.com
Timeline of Active Directory changes with replication metadata - ANSSI-FR/ADTimeline
0
0
11
MSSQL forensics (1) - MDF fundamentals https://t.co/ikgFpkvKiQ
0
0
1
Interesting Recon Script https://t.co/YwiWntWCp6
0
0
1
Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server https://t.co/V8FPTiIvtI
0
0
0