📡 – Telegram
📡
535 subscribers
68 photos
10 videos
26 files
72 links
Download Telegram
Open-Source Phishing Framework

Gophish is a powerful, open-source phishing framework that makes it easy to test your organization's exposure to phishing.
#phishing #tool
🌐Link
channel: @HackLabel
Configuring and Managing Core Dumps in Linux

A core dump is a file that gets automatically generated by the Linux kernel after a program crashes. This file contains the memory, register values, and the call stack of an application at the point of crashing.

🌐Link
channel: @HackLabel
Media is too big
VIEW IN TELEGRAM
Intro to Syscalls for Windows Malware

channel: @HackLabel
team: @AssassinsCybery
ios_ApplicationSecurity.pdf
14.7 MB
iOS Application Security
The Definitive Guide for Hackers and Developers

channel: @HackLabel
👍2
Media is too big
VIEW IN TELEGRAM
Finding Vulnerabilities in IoT Firmware

channel: @HackLabel
Aligning.Security.Operations.with.the.MITRE.ATT.CK.Framework.pdf
7.5 MB
Aligning Security Operations with the MITRE ATT&CK Framework.

channel: @HackLabel
TCP Reverse Shell in Assembly (ARM 32-bit)
https://azeria-labs.com/tcp-reverse-shell-in-assembly-arm-32-bit/ write TCP reverse shellcode that is free of null bytes.

#ARM #Exploition
Twitter: @Fox0x01 and @azeria_labs
channel: @HackLabel
From C, with inline assembly, to shellcode

Part One: Introduction
Part Two: Getting Started
Part Three: Diving In
Part Four: The Code
Part Six: Conclusion
https://steve-s.gitbook.io/0xtriboulet/just-malicious/from-c-with-inline-assembly-to-shellcode

channel: @HackLabel
2👏1
Mastering Reverse Engineering.pdf
14.2 MB
Mastering Reverse Engineerin
Reverse Engineering your ethical hacking skills

channel: @HackLabel
Media is too big
VIEW IN TELEGRAM
Windows Event Logs Investigation with Powershell | HackTheBox Artifacts of Dangerous Sightings
🌐Link

channel: @HackLabel
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
Practical_Malware_Analysis.pdf
9.4 MB
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.

📡- -
@HackLabel
practical-binary-analysis.pdf
15.9 MB
Practical Binary Analysis
build your own Linux tool for Binary Instrumentation, Analysis and Disassesmbly

📡-
@hackLabel
👍2❤‍🔥1