CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 2,261 개 / Lastupdate : 2018-02-25 10:57:13



armitagehacker Twitter


Developer of Armitage and Cobalt Strike--Tools for Red Teams and Penetration Testers. Washington, DC · advancedpentest.com

RSS Articles : 2,261
URL : twitter.com/armitagehacker
RSS : CodeEngn Live RSS 엔진

Date Article
2018-02-16 14:20:13 BAS and Red Teams Will Kill The Pentest https://blogs.gartner.com/augusto-barros/2018/02/14/bas-and-red-teams-will-kill-the-pentest … // Simple pentesting, for pure vulnerability finding goals and with no intent to replicate threat behavior, will vanish.
2018-02-16 12:40:04 Bloodhound is awesome, but much more a Blue tool than a Red. It should a standard tool used by every organization measure and (Ill say it) audit their systems. Id argue that defenders can get so much more value from Bloodhound compared to other defensive tools BlueistheNewRed
2018-02-15 21:41:53 Video demo of the External C2 from @RhinoSecurity. Again, very cool. https://www.youtube.com/watch?time_continue=17/v=wzruD7LPZp0 …
2018-02-14 20:36:00 Push CobaltStrike message to rabbitmq and then to elasticsearch /cc @armitagehacker https://github.com/truekonrads/bigear/ …
2018-02-14 01:00:27 DFIRSummit 2018 SPEAKERS / TALKS ANNOUNCED! A Process is No One: Hunting for Token Manipulation with @jaredcatkinson / @robwinchester3 from @SpecterOps DFIR InfoSec | June 7-8 | Austin, TX | http://www.sans.org/u/AzK pic.twitter.com/hBqSQm7xEl
2018-02-09 22:05:36 CVE-2018-4878 IE Driveby Edition? Aggressor Script for @armitagehackers CobaltStrike... https://github.com/vysec/CVE-2018-4878 … … https://www.youtube.com/watch?v=JhUlOIEdq0s … … Might want to take the SWF apart, recompile and redump. ¯_(ツ)_/¯
2018-02-09 19:47:22 I have an Cobalt Strike external c2 client implemented entirely in python now, eliminating the need to compile and embed a C dll in your payload. It seems stable, but Id love for someone else to test it. Code here: https://github.com/Und3rf10w/external_c2_framework/blob/3b26d83aa9fc3a65962ba7a2178201de6dbb5c72/skeletons/frameworks/cobalt_strike/client/clientcore/full_clientcore.py …
2018-02-08 14:00:47 In-Memory Evasion http://blog.cobaltstrike.com/2018/02/08/in-memory-evasion/ …
2018-02-06 18:49:31 This Thursday: @CptJesus and I present, How To Build Adversary Resilience Into Your Active Directory Environment. Register here: https://www.brighttalk.com/webcast/15713/301931?utm_source=SpecterOps/utm_medium=brighttalk/utm_campaign=301931 …
2018-02-02 18:15:00 From @joevest: Automating Apache mod_rewrite and Cobalt Strike Malleable C2 Profiles - Link: https://posts.specterops.io/automating-apache-mod-rewrite-and-cobalt-strike-malleable-c2-profiles-d45266ca642 …
2018-02-01 13:49:34 Cool! My friend @jaredcatkinson delivering an awesome session at @NICconf nicconf @SpecterOps - You rock!pic.twitter.com/iraseKfKpA
2018-01-29 17:36:08 More on DDE from @enigma0x3: Embedding Excel Sheets for Code Execution - https://posts.specterops.io/reviving-dde-using-onenote-and-excel-for-code-execution-d7226864caee …
2018-01-25 19:50:05 Check out the first of the Threat Mitigation Series from @SpecterOps https://posts.specterops.io/threat-mitigation-strategies-observations-and-recommendations-b5c10b405eb7 …
2018-01-23 18:24:10 [blog] Cobalt Strike OPSEC Profiles (co-written with @tifkin_) https://posts.specterops.io/cobalt-strike-opsec-profiles-2027436b1857 …
2018-01-19 15:36:00 Sheesh. This is my 7th @ShmooCon as an exhibitor. That new kid on the block feeling never goes away. Very much looking forward to chatting red team ops with industry friends old and new.
2018-01-18 17:04:28 New: CobaltStrike template to generate a concise Appendix of all hosts/users compromised during an engagement (for the blue teamers reading your reports). https://github.com/ramen0x3f/AggressorScripts/blob/master/compromised_log.rpt …pic.twitter.com/unzY04jP1L
2018-01-18 16:03:51 Cobalt Strike update infrastructure and website had some downtime due to updates made by provider. Infra is back up now.
2018-01-16 15:29:15 Weve released the APT3 Adversary Emulation Plan based on ATT/CK. These plans help describe a threat groups behavior for the purposes of testing security. Special thanks to @ckorban, Doug Miller, Adam Pennington, and @its_a_feature_ for their work https://attack.mitre.org/wiki/Adversary_Emulation_Plans …
2018-01-16 15:21:48 The Enterprise ATT/CK site has been updated! ATT/CK is now up to 188 techniques https://attack.mitre.org/wiki/Main_Page  Heres a list of changes: https://attack.mitre.org/wiki/Updates_January_2018 …
2018-01-12 18:38:48 We are excited to offer our Adversary Tactics: PowerShell 4-day course in Northern Virginia April 3-6! https://www.eventbrite.com/e/adversary-tactics-powershell-tickets-42130720118 …Learn how to effectively wield PowerShell as a defender and attacker, develop security feature bypasses, and develop robust detections!

Linode is a privately owned virtual private server provider based in Galloway, New Jerse