Signal_500's profile picture.

Signal

@Signal_500

Signal さんがリポスト

New Executive Offense Newsletter - Building AI Hackbots, Hard-Earned Lessons Pt 1 (and course giveaway) executiveoffense.beehiiv.com/p/ai-hackbots-… Giveaway: Retweet this post and be entered to win a seat in Q4s courses! ("Red Blue Purple AI" or "Attacking AI") Three winners will be chosen next…


Signal さんがリポスト

Excited to announce a new giveaway, thanks to @PentesterLab. We will pick 10 winners to win 6 month (x5) and 1 month (x5) subscriptions. To enter: 1️⃣ Follow us @BugBountyDefcon and @PentesterLab 2️⃣ Like this post ❤️ 3️⃣ RT this post 🔁 You've time until next Friday (10/18), GO!


Signal さんがリポスト

PortSwigger's BChecks is insane. You're mistaken if you think it's just a Nuclei clone. Nuclei lets you check a limited number of locations for issues. Imagine you can leverage the crawling capabilities of Burp to search for NTLM auth everywhere on a target.

sprocket_ed's tweet image. PortSwigger's BChecks is insane. You're mistaken if you think it's just a Nuclei clone. Nuclei lets you check a limited number of locations for issues. Imagine you can leverage the crawling capabilities of Burp to search for NTLM auth everywhere on a target.

Signal さんがリポスト

Cortana Living of the land. 1) Create LNK file under and name it however you like . c:\users\***\appdata\Roaming\Microsoft\Windows\Start Menu\Programs 2) Open Cortana and ask her nicely to open Koko for example. 3) parent process will be win32bridge.server.exe. #lolbas

VakninHai's tweet image. Cortana Living of the land.

1) Create LNK file under and name it however you like .
c:\users\***\appdata\Roaming\Microsoft\Windows\Start Menu\Programs

2) Open Cortana and ask her nicely to open Koko for example. 

3) parent process will be win32bridge.server.exe.

#lolbas

United States トレンド

Loading...

Something went wrong.


Something went wrong.