alexander knorr

alexander knorr


infosec https://t.co/CGeduqOzJn

11803 followers  •  7810 follow  •    •   https://t.co/PnIKgmN8vM

New tools to block legacy authentication in your organization

Use Cloud Infrastructure Data Model to Detect Container Implantation (MITRE T1525)

FBI Issues Warning, NY Attorney General Makes Inquiry After Wave of Zoom Hijackings

The latest Marriott data breach impacts up to 5.2 million people—here's what to do if you were affected

US Consumers Are Keeping a Close Eye on How Brands Handle the Coronavirus Crisis

Loading
Loading

GitHub - rshipp/awesome-malware-analysis: A curated list of awesome malware analysis tools and resources.

This is how chains are made — Learn Something (EarnKnowledge) October 29, 2015

tweet picture

HiddenEye: Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services

Extracting SSH Private Keys from Windows 10 ssh-agent

google/ssl_logger: Decrypts and logs a process's SSL traffic.

An Introduction To Code Analysis With Ghidra

Volatility Plugin for Detecting Cobalt Strike Beacon - JPCERT/CC Eyes | JPCERT Coordination Center official Blog

Loading
Loading