Tweets

You blocked @zeroSteiner

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @zeroSteiner

  1. May 6

    Did you know recently added functionality for creating .NET Deserialization payloads like does?

    Undo
  2. Retweeted
    Apr 24

    has been working on some updates to the awesome tool, find out about our improvements here

    Undo
  3. Retweeted
    Apr 17

    Fresh new weekly wrap-up courtesy of ! Several enhancements and eight new modules, including Nexus Repo Manager and TP-Link Archer A7/C7 RCEs, plus the ability to execute .NET assemblies in memory on a target. 🐚

    Undo
  4. Retweeted
    Apr 15

    Introducing AttackerKB: A new community resource that highlights diverse perspectives on which vulnerabilities make the most appealing targets for attackers.

    Undo
  5. Retweeted
    Apr 14

    So finally my PR was merged. Now metasploit has execute_dotnet_assembly module to load and run .Net assembly in memory with some cool evasion stuff

    Undo
  6. Retweeted
    Apr 13

    With bluetooth available on almost every mobile device, and moving to IoT devices, how secure is it? tackles that question in his talk "Bluetooth and why we need more people studying it" coach by spots still available

    Undo
  7. Apr 11

    I'll be live streaming some work (and hopefully testing) a .NET deserialization library for exploits in about an hour at 12:30 EST

    Undo
  8. Retweeted
    Apr 11

    Our exploit for CVE-2020-0796 () is already in Metasploit! Thanks ! ;) /cc

    Undo
  9. Mar 27

    I'll be back streaming again tomorrow at about 12:30-14:00 EST as I continue work on a .NET serialization library for

    Undo
  10. Retweeted
    Mar 25

    SharePoint Workflows XOML RCE (CVE-2020-0646) exploit landed in Thx and

    Undo
  11. Mar 20

    Weekend plans? Staying in? Me too, so I'll be live streaming some Ruby development as I work on a .NET serialization library for Metasploit tomorrow from about 12:30-14:00 EST

    Undo
  12. Retweeted
    Mar 19

    Luke 'Get Off My Island' Skywalker- ORIGINAL SOCIAL-DISTANCING ENTHUSIAST

    Undo
  13. Retweeted
    Mar 3

    If you want to see what a Metasploit exploit that uses HTTP is doing, `set HttpTrace true` will cause it to print full requests and responses. It's super verbose, of course, so probably not something you want all the time, but very helpful when you need it.

    Show this thread
    Undo
  14. Mar 3

    CVE-2020-0688 (MS Exchange RCE) just landed to , just needs a domain user with a mailbox for SYSTEM code exec

    Undo
  15. Feb 21

    If I started streaming about framework usage / module development would you: (reply with other ideas)

    Undo
  16. Retweeted
    Feb 4

    We on the Labs team use Projects Sonar and Heisenberg to provide context for risk on the Internet. Today I published a blog post on DOUBLEPULSAR over RDP in support of 's efforts in this area.

    Show this thread
    Undo
  17. Retweeted
    Jan 15

    Registration for the 2020 Metasploit community CTF is now open. 1,000 teams, four days to find flags, unlimited shells. Play starts January 30. NOTE: Teams only need to register ONE account. Get it:

    Undo
  18. Retweeted
    Jan 8

    Howdy, folks. We'll be hosting another community CTF at the end of January. Stay tuned for a registration announcement next week.

    Undo
  19. Retweeted
    Jan 3

    wrap-up via new team member : OpenBSD Dynamic Loader chpass privesc and a Metasploit handler DoS (super meta), plus improved WordPress check logic. TGIF, etc:

    Undo
  20. Retweeted
    31 Dec 2019

    The team's last Demo meeting of 2019 is in the bag, just in time for New Years! Five new modules and a good number of enhancements and bug fixes, plus demos by and !! Have a safe and Happy 2020, y'all!! 🎉

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·