❀

iEmoji Feeds @Antonio Cocomazzi (splinter_code)

1.

splinter_code
Antonio Cocomazzi @splinter_code
IIS Backdoors! Let's ride this ! Let's expose these modules and see what we get!

Level set what modules are, shi… twitter.com/i/web/status/1…
Retweet of status by @M_haggis
09 Feb 23 copy & paste +upvote -downvote IIS Backdoors! Let's ride this πŸš„! Let's expose πŸ‘€these modules and see what we get! Level set what modules are, shi… https://t.co/dMAGZN5ru6

2.

splinter_code
Antonio Cocomazzi @splinter_code
A bad news for all potato lovers

Starting from Windows 11 22H2 a new code change in lsasrv.dll broke the trick t… twitter.com/i/web/status/1…
18 Nov 22 copy & paste +upvote -downvote A bad news for all potato lovers 😭 Starting from Windows 11 22H2 a new code change in lsasrv.dll broke the trick t… https://t.co/l79MtG3lgk
3.
splinter_code
Antonio Cocomazzi @splinter_code
After 18 months #RemotePotato0 has been silently fixed

The downgrade attack performed in the ResolveOxid2 respon… twitter.com/i/web/status/1…
21 Oct 22 copy & paste +upvote -downvote After 18 months #RemotePotato0 has been silently fixed πŸ₯³ The downgrade attack performed in the ResolveOxid2 respon… https://t.co/68z0FLHuJD
4.
splinter_code
Antonio Cocomazzi @splinter_code
After more than 2 years, RunasCs got a big update!

Biggest changes:
- NetworkCleartext (8) default logon type
-… twitter.com/i/web/status/1…
18 Sep 22 copy & paste +upvote -downvote After more than 2 years, RunasCs got a big update! πŸ₯³ Biggest changes: - NetworkCleartext (8) default logon type -… https://t.co/xTk618tY5Q
5.
splinter_code
Antonio Cocomazzi @splinter_code
The recording of my talk "Ransomware Encryption Internals: A Behavioral Characterization" at @1ns0mn1h4ck is now… twitter.com/i/web/status/1…
05 Apr 22 copy & paste +upvote -downvote πŸ’£ The recording of my talk "Ransomware Encryption Internals: A Behavioral Characterization" at @1ns0mn1h4ck is now… https://t.co/IR3fxqv964
6.
splinter_code
Antonio Cocomazzi @splinter_code
New blog post for @MDSecLabs A very interesting method for executing code in a COM process! twitter.com/MDSecLabs/stat…
Retweet of status by @modexpblog
05 Apr 22 copy & paste +upvote -downvote New blog post for @MDSecLabs πŸ‘ A very interesting method for executing code in a COM process! πŸ˜€ https://t.co/yfrWnn3RIJ

...but wait! There's more!

1.

fakhright
fakhright @fakhright
astaghfirullah peng.krim guaaaaaaaa..............a *salto sambil solat*
14 Jan 13 copy & paste +upvote -downvote astaghfirullah peng.krim guaaaaaaaa..............a *salto sambil solat* πŸ™ˆπŸ™ˆπŸ™Š

2.

ReganBrittany
ReganBrittany @ReganBrittany
Nanana diva is the female version of the hustlaaaa! #gettinmoney
14 Jan 13 copy & paste +upvote -downvote Nanana diva is the female version of the hustlaaaa! #gettinmoney πŸ’°πŸ’΅πŸ’Έ
3.
Rickygonz1215
Rickygonz1215 @Rickygonz1215
If I weighed 182 I'd be cut
13 Jan 13 copy & paste +upvote -downvote If I weighed 182 I'd be cut πŸ‘ŒπŸ’ͺπŸ’ͺπŸ’ͺ
https://www.iemoji.com/feed/splinter_code
Back to top