Autor
Wszystkie
Archiwum
@konik_polanowy: Jestem prostym człowiekiem, widzę dobry content, daję plusa.
Remote Code Execution on most Dell computers
Unraveling the JPEG
Designing Peer-To-Peer Command and Control
Real numbers, data science and chaos:How to fit any dataset with a single parameter >>>
#polanowyhacking
Unraveling the JPEG
Designing Peer-To-Peer Command and Control
Real numbers, data science and chaos:How to fit any dataset with a single parameter >>>
>> tldr; Real numbers, data science and chaos: How to fit any dataset with a single parameter
#polanowyhacking
@konik_polanowy: Jestem prostym człowiekiem, widzę dobry content, daję plusa.
Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware
Jak trzymać hasła w pamięci i dlaczego cstringi są czasem lepsze od std::stringów?
Protecting disconnected devices with Microsoft Defender ATP
Don't Follow The Masses: Bug Hunting in JavaScript Engines
SymCrypt is the core cryptographic function library currently used by Windows.
edit:
#polanowyhacking
Jak trzymać hasła w pamięci i dlaczego cstringi są czasem lepsze od std::stringów?
Protecting disconnected devices with Microsoft Defender ATP
Don't Follow The Masses: Bug Hunting in JavaScript Engines
SymCrypt is the core cryptographic function library currently used by Windows.
edit:
#polanowyhacking
//Awesome
Awesome CS Courses
Awesome Threat Detection and Hunting
Awesome Security Write-Ups and POCs
Awesome Machine Learning
Awesome Hacking
Awesome Security
Awesome APIs
Awesome Sysadmin
Awesome Hacking Resources
Awesome OSINT
Awesome Networking
pentest-bookmarks - BookmarksList.wiki
Awesome Python
Awesome PHP
Bug Hunting Guide
#polanowyhacking #informatyka #devops #security #programowanie
Awesome CS Courses
Awesome Threat Detection and Hunting
Awesome Security Write-Ups and POCs
Awesome Machine Learning
Awesome Hacking
Awesome Security
Awesome APIs
Awesome Sysadmin
Awesome Hacking Resources
Awesome OSINT
Awesome Networking
pentest-bookmarks - BookmarksList.wiki
Awesome Python
Awesome PHP
Bug Hunting Guide
#polanowyhacking #informatyka #devops #security #programowanie
Building a Passive IMSI Catcher
PostgreSQL Features You May Not Have Tried But Should
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Reversing a Phishing PDF, Targeting Apple Users
#polanowyhacking
PostgreSQL Features You May Not Have Tried But Should
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Reversing a Phishing PDF, Targeting Apple Users
#polanowyhacking
Fooling automated surveillance cameras: adversarial patches to attack person detection
WordWarper – new code injection trick
Security baseline (DRAFT) for Windows 10 v1903 and Windows Server v1903
'Highly Critical' Unpatched Zero-Day Flaw Discovered In Oracle WebLogic
Online hash checker for Virustotal and other services
#polanowyhacking
WordWarper – new code injection trick
Security baseline (DRAFT) for Windows 10 v1903 and Windows Server v1903
'Highly Critical' Unpatched Zero-Day Flaw Discovered In Oracle WebLogic
Online hash checker for Virustotal and other services
#polanowyhacking
Why Google Chrome runs so much processes
Analyzing the DOUBLEPULSAR Kernel DLL Injection Technique
Malware Theory on Blackboard
Black Hat Asia 2019 Keynote: The Next Arms Race
#polanowyhacking
Analyzing the DOUBLEPULSAR Kernel DLL Injection Technique
Malware Theory on Blackboard
Black Hat Asia 2019 Keynote: The Next Arms Race
#polanowyhacking
DNS Hijacking Abuses Trust In Core Internet Service
Who first came with the concept of Computer Mouse, XEROX or Apple?
VirusTotal Command Line Interface
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms
Windows Exploit Suggester - Next Generation
facebook-bug-bounty-writeups
#polanowyhacking
Who first came with the concept of Computer Mouse, XEROX or Apple?
VirusTotal Command Line Interface
MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms
Windows Exploit Suggester - Next Generation
facebook-bug-bounty-writeups
#polanowyhacking
Hacking (Back) and Influence Operations
Day 18: Essential CTF Tools
Lateral Movement—SCM and DLL Hijacking Primer
Backdooring Plugins
Exploiting Password Reuse on Personal Accounts: How to Gain Access to Domain Credentials Without Being on a Target’s Network: Part 1
Password Spraying Outlook Web Access – How to Gain Access to Domain Credentials Without Being on a Target’s Network: Part 2
#polanowyhacking
Day 18: Essential CTF Tools
Lateral Movement—SCM and DLL Hijacking Primer
Backdooring Plugins
Exploiting Password Reuse on Personal Accounts: How to Gain Access to Domain Credentials Without Being on a Target’s Network: Part 1
Password Spraying Outlook Web Access – How to Gain Access to Domain Credentials Without Being on a Target’s Network: Part 2
#polanowyhacking
Stealing 2FA Tokens on Red Teams with CredSniper
Advanced credential stuffing with PEPE
FRIDAY NIGHT LIGHTS: DIY Build Your Own PVS-14
OffensiveCon19 - Alex Ionescu - Keynote - Reversing Without Reversing
#polanowyhacking
Advanced credential stuffing with PEPE
FRIDAY NIGHT LIGHTS: DIY Build Your Own PVS-14
OffensiveCon19 - Alex Ionescu - Keynote - Reversing Without Reversing
#polanowyhacking
LDAP Reconnaissance – the foundation of Active Directory attacks
Penetration Testing Skype for Business: Exploiting the Missing Lync
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone - sprawdźcie pozostałe filmy
#polanowyhacking