PrivacyTools.io provides services, tools and privacy guides to counter global mass surveillance. Established in 2015 after Edward Snowden's revelations, and is now the most popular privacy website.
🌐Link
channel: @HackLabel
🌐Link
channel: @HackLabel
www.privacytools.io
Best Privacy Tools & Software Guide in in 2025
The most reliable website for privacy tools since 2015. Software, services, apps and privacy guides to fight surveillance with encryption for better internet privacy.
⚡2❤🔥1
Open-Source Phishing Framework
Gophish is a powerful, open-source phishing framework that makes it easy to test your organization's exposure to phishing.
#phishing #tool
🌐Link
channel: @HackLabel
Gophish is a powerful, open-source phishing framework that makes it easy to test your organization's exposure to phishing.
#phishing #tool
🌐Link
channel: @HackLabel
Getgophish
Gophish - Open Source Phishing Framework
Gophish - An Open-Source Phishing Framework
Configuring and Managing Core Dumps in Linux
A core dump is a file that gets automatically generated by the Linux kernel after a program crashes. This file contains the memory, register values, and the call stack of an application at the point of crashing.
🌐Link
channel: @HackLabel
A core dump is a file that gets automatically generated by the Linux kernel after a program crashes. This file contains the memory, register values, and the call stack of an application at the point of crashing.
🌐Link
channel: @HackLabel
Baeldung on Linux
Configuring and Managing Core Dumps in Linux | Baeldung on Linux
Learn how to manage and configure core dumps. We'll investigate kernel.core_pattern and coredumpctl.
Shell We Assemble? Unleashing Assembly for Shellcode Execution
https://redops.at/en/blog/shell-we-assemble-unleashing-x86-inline-assembly-for-shellcode-execution
channel: @HackLabel
https://redops.at/en/blog/shell-we-assemble-unleashing-x86-inline-assembly-for-shellcode-execution
channel: @HackLabel
RedOps - English
.Shell We Assemble? Unleashing Assembly for Shellcode Execution - RedOps
TCP Reverse Shell in Assembly (ARM 32-bit)
https://azeria-labs.com/tcp-reverse-shell-in-assembly-arm-32-bit/ write TCP reverse shellcode that is free of null bytes.
#ARM #Exploition
Twitter: @Fox0x01 and @azeria_labs
channel: @HackLabel
https://azeria-labs.com/tcp-reverse-shell-in-assembly-arm-32-bit/ write TCP reverse shellcode that is free of null bytes.
#ARM #Exploition
Twitter: @Fox0x01 and @azeria_labs
channel: @HackLabel
Katalina - new tool that executes Android byte code, enabling to deobfuscate strings in Android malware
It’s written in Python and emulates each individual bytecode instruction that was used back in the day for Android
https://www.humansecurity.com/tech-engineering-blog/katalina-an-open-source-android-string-deobfuscator
Github: https://github.com/huuck/Katalina
channel: @HackLabel
It’s written in Python and emulates each individual bytecode instruction that was used back in the day for Android
https://www.humansecurity.com/tech-engineering-blog/katalina-an-open-source-android-string-deobfuscator
Github: https://github.com/huuck/Katalina
channel: @HackLabel
HUMAN Security
Katalina: an open-source Android string deobfuscator - HUMAN Security
Learn how Katalina, an open-source Android string deobfuscator, is revolutionizing the fight against Android malware. Discover how this free tool can help researchers uncover hidden strings and enhance malware analysis.
From C, with inline assembly, to shellcode
Part One: Introduction
Part Two: Getting Started
Part Three: Diving In
Part Four: The Code
Part Six: Conclusion
https://steve-s.gitbook.io/0xtriboulet/just-malicious/from-c-with-inline-assembly-to-shellcode
channel: @HackLabel
Part One: Introduction
Part Two: Getting Started
Part Three: Diving In
Part Four: The Code
Part Six: Conclusion
https://steve-s.gitbook.io/0xtriboulet/just-malicious/from-c-with-inline-assembly-to-shellcode
channel: @HackLabel
Media is too big
VIEW IN TELEGRAM
Windows Event Logs Investigation with Powershell | HackTheBox Artifacts of Dangerous Sightings
🌐Link
channel: @HackLabel
🌐Link
channel: @HackLabel
Journey into Windows Kernel Exploitation: The Basics.
https://blog.neuvik.com/journey-into-windows-kernel-exploitation-the-basics-fff72116ca33
channel: @HackLabel
https://blog.neuvik.com/journey-into-windows-kernel-exploitation-the-basics-fff72116ca33
channel: @HackLabel
Medium
Journey into Windows Kernel Exploitation: The Basics
This blogpost embarks on the initial stages of kernel exploitation. The content serves as an introduction, leading to an imminent and…
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.
•For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
•For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
40 Basic Practices in Assembly Language Programming
https://www.codeproject.com/Articles/1116188/40-Basic-Practices-in-Assembly-Language-Programmin
📡- -@HackLabel
https://www.codeproject.com/Articles/1116188/40-Basic-Practices-in-Assembly-Language-Programmin
📡- -@HackLabel
Codeproject
40 Basic Practices in Assembly Language Programming - CodeProject
A discussion on some basic practices highly recommended in Assembly Language Programming.