Really loved the part when you talked about use cases for prebuild events. Wish to see more things like this in future videos because we know for sure that ippsec has a lot more to show than just solving a htb box. Thanks really ❤
What's going on UA-cam, this is IppSec, and we're coding our own AI girlfriend in Python. We'll use the TensorFlow framework, train a neural network for speech generation and use Blender to create a 3D model of the character Power from the anime Chainsaw Man. With all that being said, let's just jump in.
Hey Ipp, yes these types of things like protobuf and C2 are very interesting. Do you have your own C2 framework, something like Cobalt Strike. Would be nice to see more RedTeam kinda videos if possible
In linux there’s something called socket reuse in linux, once a shell comes back netcat is no longer listening it moves to different ports freeing up the original one
We need to protect this man at all costs. The clarity and effort he puts into explaining is fantastic 👏👏
Really loved the part when you talked about use cases for prebuild events. Wish to see more things like this in future videos because we know for sure that ippsec has a lot more to show than just solving a htb box. Thanks really ❤
What's going on UA-cam, this is IppSec, and we're coding our own AI girlfriend in Python. We'll use the TensorFlow framework, train a neural network for speech generation and use Blender to create a 3D model of the character Power from the anime Chainsaw Man. With all that being said, let's just jump in.
Certainly wouldn't use Python for something like that. No one wants a Slytherin as a girlfriend. Would more likely use Go.
@@ippsec lel
@@ippsec why ippsec ?
@@tntxqx8281because it has several advantages like performance and scalability. But Python still has more libraries.
ippsecstan 👍
I always enjoy all your tangents :) thank you for sharing
Prebuilds.Cool. This was clear and efficiently convise.
Nice video, rhanks for taking the time to explain the details.
Hey Ipp, yes these types of things like protobuf and C2 are very interesting. Do you have your own C2 framework, something like Cobalt Strike. Would be nice to see more RedTeam kinda videos if possible
NOTE: the --rm destroys the CONTAINER not the IMAGE.
This is pure gold... Thanks!
Good as always, keep up the great work❤
26:40 atp you guys should reject any machines where windows defender doesn't reject default nishang rev shells.
Does anyone know how he obtain multiple shells listening only on port 9001 each time ?
In linux there’s something called socket reuse in linux, once a shell comes back netcat is no longer listening it moves to different ports freeing up the original one
@@ippsec helpful
I noticed that too
Good video, thanks !
Push!
Thank you
ippsec 我爱你
mt bom
What's wrong with nc64.exe??
I do prefer them