CodeEngn Logo

Live

CodeEngn Live RSS는 국내외 Security 관련 사이트, 블로그, 뉴스 등의 RSS를 쉽고 빠르게 볼 수 있는 RSS Reader 입니다.

추가 및 변경 신청은 Contact 메뉴에서 요청 해주세요.

- Atom, RSS v1.0, RSS v2.0 지원

- Facebook, Twitter RSS 지원

- 3분마다 자동 Live 웹페이지 Refresh

- 5분마다 등록된 RSS 주소들에 대한 title, link 자동 데이터 수집

- title, article, date 검색 가능

- 국내사이트, 국내SNS 등의 분류별 보기 가능

- URL 상에 사용하지 않는 변수 동적 제거를 통한 URL 최적화

- 로그인된 사용자에게 Scrap 기능 제공

분류 RSS 목록
국내 사이트 [84] 0x90 / A-FIRST Reverse Engineering / Acuros Innovation / ASEC Threat Research Response blog / Binary`s blog / binish1story / Broken Code (window31) / ByJJoon Lab / COMPUTER in HAVU / DarkSoul.Story / Deok9 / Ezbeat의 도서관 / F-INSIGHT / Focus on KaiEn!! / FORENSIC-PROOF / GrayHash / Hack Creative / HACKABILITY / Hackers on the Ship / HackSum / HackSum / HackTalk Security / Hakawati Security Lab / I Dont Know Who I aM / int $0x80 / J0hn Doe / KaisHack GoN / kcats`s mindstory / kernelhack :D / KISA 인터넷침해대응센터::기술문서 / KISA 인터넷침해대응센터::보안공지 / KISA 인터넷침해대응센터::분석월보 / KISA 인터넷침해대응센터::사고노트 / kkoha / kth 개발자 블로그 / M0nst3rZ_TEAM_blog / MaJ3stY / Maxoverpro Lab / Misterleeee / n0fate Forensic Space / Noplanlife by JunePark / Only love / Out of Control / PacketInside / 네트워크 패킷 분석 블로그 / Pagez | Computer Security Study blog / passket.net / pieces of code / Pragmatic Forensics / Prof. Huy Kang Kim`s Lifelog (김휘강의 Lifelog) / pwn3r tistory / RedHidden 새빨간 거짓말 / REVERSERGOODBOY.KR / RExVuz / Ride the Lightning / RIGHT TO KNOW / S3ize th3 Day / Sasin / StolenByte World!! / Sup3Rv1s0R / TeamCR@K / Think Like a Man of Action and Act Like Man of Thought... / wannabe FALCON / window 쪼물딱 거리기 / www.reversecore.com / Yesterday you told me about the blue blue sky / ZIZI ‡‡‡ 선택과 집중~ ‡‡‡ / 내맘이 안그래 / 라온시큐어 보안기술연구팀 / 렇렇 / 미친감자 / 바나나맛 페이로드 / 바다란 세상 가장 낮은 곳의 또 다른 이름 / 바이너리에 따뜻한 영혼을 / 보안프로젝트 / 복지 기업 CEO 니키 / 세상에서 가장 안전한 이름, 안랩 / 시스코 블로그 / 아폴로씨의 잡다한 경험들.. / 안랩인들이 만들어가는 커뮤니케이션 블로그 / 울지않는벌새 / 인터넷과 보안 / 잉카인터넷 대응팀 / 쿨캣의 블로그 놀이 / 헐랭이와 IT보안 (opt9 IT Security) /
국외 사이트 [29] /dev/ttyS0 | Embedded Device Hacking / codezen.fr / Darknet / Download Hacking Tools at Tools Yard / Eric Romang Blog / Exploit Database Blog / Fiddler / Flylogic`s Analytical Blog / Hack a Day / IC reverse engineering / InfoSec Research / IOActive Labs Research / j00ru//vx tech blog / MNIN Security Blog / NYU Poly ISIS Lab / Project Zero / reddit netsec / reddit ReverseEngineering / Reverse Engineering Mac OS X / Reverse Engineering Mac OS X / Security-Shell / SecurityXploded Latest Security Articles / SecurityXploded Latest Security News / SecurityXploded Latest Security Tools / sla.ckers / The Adallom Blog / The Hacker News [ THN ] / VNSECURITY Blog / w00tsec /
국내 twitter [7] beist Twitter / estima7 Twitter / ITL, SANS 코리아 Twitter / Matt Twitter / passket Twitter / 김승주 Twitter / 바다란 Twitter /
국외 twitter [32] aboutsecurity Twitter / armitagehacker Twitter / bartblaze Twitter / BorjaMerino Twitter / carlosacastillo Twitter / Carlos_Perez Twitter / Dinosn Twitter / energizedtech Twitter / geeknik Twitter / gN3mes1s Twitter / Hfuhs Twitter / hiddenillusion Twitter / j00ru Twitter / jedisct1 Twitter / Jhaddix Twitter / juneb_get_help Twitter / mikefrobbins Twitter / osxreverser Twitter / Phreaky Twitter / PhysicalDrive0 Twitter / pof Twitter / ProjectHoneynet Twitter / quequero Twitter / r0bertmart1nez Twitter / r_netsec Twitter / secdocs Twitter / securitytube Twitter / SecurityXploded Twitter / Security_FAQs Twitter / soaj1664ashar Twitter / teamcymru Twitter / xanda Twitter /
Facebook [1] 보안프로젝트 리서치 /
국내 보안뉴스 [2] 데일리시큐 / 보안뉴스 /
국외 보안뉴스 [1] Zero Day | ZDNet /



검색된 RSS Articles : 2,327 개 / Lastupdate : 2018-05-24 15:22:27



armitagehacker Twitter


Developer of Armitage and Cobalt Strike--Tools for Red Teams and Penetration Testers. Washington, DC · advancedpentest.com

RSS Articles : 2,327
URL : twitter.com/armitagehacker
RSS : CodeEngn Live RSS 엔진

Date Article
2018-05-19 19:13:43 IPFuscation - Use alternate IP representation in your command and control as well as issuing of commands! redteam infosec cyber pentest https://vincentyiu.co.uk/ipfuscation/
2018-05-18 17:29:47 Cobalt Strike Splunk Application for @armitagehackers CobaltStrike available here https://github.com/vysec/CobaltSplunk … It parses Cobalt Strike logs, and has some predefined dashboards and queries :)
2018-05-18 17:23:13 [NEW POST] CobaltSplunk - A Splunk Application to parse your Cobalt Strike logs, analyse them, and provide immediate value! Helps towards further streamline operations! https://vincentyiu.co.uk/cobaltsplunk/  redteam infosec pentest cybersecurity
2018-05-09 01:46:49 TIBER-EU FRAMEWORK – How to implement the European framework for Threat Intelligence-based Ethical Red Teaming https://www.ecb.europa.eu/pub/pdf/other/ecb.tiber_eu_framework.en.pdf?2112e5340904c8c8152f89f298ec8b3a …
2018-05-01 15:14:21 Do you have compatibility issues? Troubleshoot them! New LOLBin, got a CobaltStrike beacon through pcwrun.exepic.twitter.com/9CmEoSp5eU
2018-04-23 13:00:57 Fighting the Toolset http://www.youtube.com/watch?v=RoqVunX_sqA …http://blog.cobaltstrike.com/2018/04/23/fighting-the-toolset/ …
2018-04-19 01:50:38 first step is to admit one has a problem. Been spending way to much time with @armitagehacker agressor scripts and the new features in 3.1 :P
2018-04-17 13:16:28 Magic Unicorn 3.1 released. Adds better stability for Windows 7 payload deployments and better handling of Cobalt Strike payloads. http://GitHub.com/TrustedSec/unicorn … TrustedSec
2018-04-15 17:39:25 The @UVA Cavaliers are the 2018 National Collegiate Cyber Defense Competition champions. Congrats, Hoos! NCCDC http://rtn.co/2HCnrLi pic.twitter.com/Zou5lqWI1F
2018-04-15 17:17:43 Please join us in congratulating FIRST place winners of the 13th Annual NCCDC ... The University of Virginia!!! @UVApic.twitter.com/I8wcczdI3T
2018-04-13 16:33:42 Blog Post - SpecterOps Adversary Tactics: PowerShell Class Review - Thanks to @SpecterOps @mattifestation @enigma0x3 @harmj0y https://blog.conscioushacker.io/index.php/2018/04/11/specterops-adversary-tactics-powershell-class-review/ …
2018-04-13 07:21:00 HTTPS Payload and C2 Redirectors – Posts By SpecterOps Team Members https://bluescreenofjeff.com/2018-04-12-https-payload-and-c2-redirectors/ … Featured infosec news: @bluscreenofjeff
2018-04-09 13:00:28 Cobalt Strike 3.11 – The snake that eats its tail http://blog.cobaltstrike.com/2018/04/09/cobalt-strike-3-11-the-snake-that-eats-its-tail/ …pic.twitter.com/jvpDdhYPjH
2018-04-09 07:07:24 Published a new blog post looking at the awesome Get-InjectedThread powershell tool, and reviewing potential ways we can evade detection during an assessment: https://blog.xpnsec.com/undersanding-and-evading-get-injectedthread/ …
2018-04-06 15:33:00 Happy Friday! We are pleased to announce a new public offering of our Adversary Tactics: Red Team Operations course. June 12-15th in Chicago. Hope to see you there!… http://specterops-atrto-chicago.eventbrite.com
2018-04-06 14:42:59 Know youre doing it right when you hit evil level on @SwiftOnSecurity radar. =Dpic.twitter.com/lHIokSm5O6
2018-04-04 15:39:49 Domain Fronting with Cobalt Strike? You can stage via domain fronting too. The http-stager block accepts client headers (since 3.9). The Host: field in the Add Listener dialog controls the staging host.
2018-04-02 16:20:02 BloodHound 1.5 enables easy GPO enforcement analysis. Heres my write-up on how red teams can take advantage of this on their tests: https://posts.specterops.io/a-red-teamers-guide-to-gpos-and-ous-f0d03976a31e …
2018-03-31 20:31:12 Aggregated a number of Cobalt Strike aggressor scripts for UAC bypass techniques. Something weve used ourselves and thought wed share https://github.com/RhinoSecurityLabs/Aggressor-Scripts/tree/master/UACBypass …
2018-03-30 10:27:18 Published a quick blog post on using Cobalt Strikes ExternalC2 interface to create a custom C2 channel https://blog.xpnsec.com/exploring-cobalt-strikes-externalc2-framework/ …

Linode is a privately owned virtual private server provider based in Galloway, New Jerse