boot2generic's profile picture. Generic by Nature | Security Researcher | Opinions here are my own

boot2generic

@boot2generic

Generic by Nature | Security Researcher | Opinions here are my own

ShmooCon was fun, recommend checking out LetItGo, and ProcAid if you haven't.


Highly Recommend Adversary Tactics: Vulnerability Research for Operators training @SpecterOps, one of the best training formats I have seen. A lot of information to cover and they do a great job presenting it.


boot2generic reposted

Weekend project - unpacking #donut payloads. @TheRealWover Et Al. have made something really groundbreaking, worth a look - github.com/TheWover/donut

kulinacs's tweet image. Weekend project - unpacking #donut payloads.

@TheRealWover Et Al. have made something really groundbreaking, worth a look - github.com/TheWover/donut

boot2generic reposted

New by me: 0DayAllDay Hackers Go Godzilla On Guardzilla To Reveal A Real Video Nasty via @forbes forbes.com/sites/daveywin… #IoT #cybersecurity #Rapid7 #0DayAllDay


boot2generic reposted

Check out 0DayAllDay's latest blog. Where @kulinacs and @CharlesDardaman got their first CVE (CVE-2018-5560). Vulnerability is still present as the vendor never responded. 0dayallday.org/guardzilla-vid…


boot2generic reposted

Just updated the spraying toolkit to support a custom OWA URL as the target. Also bugfixes! github.com/byt3bl33d3r/Sp…


boot2generic reposted

*mind blown* F7 in cmd pops up an inline list of all the previous commands you've executed. Omg, I've used cmd for *decades* and never knew that!

AndySterland's tweet image. *mind blown* F7 in cmd pops up an inline list of all the previous commands you've executed. Omg, I've used cmd for *decades* and never knew that!

Some sketchy firmware

Thanks to @kulinacs you can download firmware for both the TPLink and the Guardzilla that he ripped this morning at the #0DAYALLDAY event: github.com/kulinacs/0daya…



⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️ securify.nl/advisory/SFY20… ⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️⛈️


Loading...

Something went wrong.


Something went wrong.