TCP Reverse Shell in Assembly (ARM 32-bit)
https://azeria-labs.com/tcp-reverse-shell-in-assembly-arm-32-bit/ write TCP reverse shellcode that is free of null bytes.
#ARM #Exploition
Twitter: @Fox0x01 and @azeria_labs
channel: @HackLabel
https://azeria-labs.com/tcp-reverse-shell-in-assembly-arm-32-bit/ write TCP reverse shellcode that is free of null bytes.
#ARM #Exploition
Twitter: @Fox0x01 and @azeria_labs
channel: @HackLabel
Katalina - new tool that executes Android byte code, enabling to deobfuscate strings in Android malware
It’s written in Python and emulates each individual bytecode instruction that was used back in the day for Android
https://www.humansecurity.com/tech-engineering-blog/katalina-an-open-source-android-string-deobfuscator
Github: https://github.com/huuck/Katalina
channel: @HackLabel
It’s written in Python and emulates each individual bytecode instruction that was used back in the day for Android
https://www.humansecurity.com/tech-engineering-blog/katalina-an-open-source-android-string-deobfuscator
Github: https://github.com/huuck/Katalina
channel: @HackLabel
HUMAN Security
Katalina: an open-source Android string deobfuscator - HUMAN Security
Learn how Katalina, an open-source Android string deobfuscator, is revolutionizing the fight against Android malware. Discover how this free tool can help researchers uncover hidden strings and enhance malware analysis.
From C, with inline assembly, to shellcode
Part One: Introduction
Part Two: Getting Started
Part Three: Diving In
Part Four: The Code
Part Six: Conclusion
https://steve-s.gitbook.io/0xtriboulet/just-malicious/from-c-with-inline-assembly-to-shellcode
channel: @HackLabel
Part One: Introduction
Part Two: Getting Started
Part Three: Diving In
Part Four: The Code
Part Six: Conclusion
https://steve-s.gitbook.io/0xtriboulet/just-malicious/from-c-with-inline-assembly-to-shellcode
channel: @HackLabel
Media is too big
VIEW IN TELEGRAM
Windows Event Logs Investigation with Powershell | HackTheBox Artifacts of Dangerous Sightings
🌐Link
channel: @HackLabel
🌐Link
channel: @HackLabel
Journey into Windows Kernel Exploitation: The Basics.
https://blog.neuvik.com/journey-into-windows-kernel-exploitation-the-basics-fff72116ca33
channel: @HackLabel
https://blog.neuvik.com/journey-into-windows-kernel-exploitation-the-basics-fff72116ca33
channel: @HackLabel
Medium
Journey into Windows Kernel Exploitation: The Basics
This blogpost embarks on the initial stages of kernel exploitation. The content serves as an introduction, leading to an imminent and…
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software.
•For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
•For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
40 Basic Practices in Assembly Language Programming
https://www.codeproject.com/Articles/1116188/40-Basic-Practices-in-Assembly-Language-Programmin
📡- -@HackLabel
https://www.codeproject.com/Articles/1116188/40-Basic-Practices-in-Assembly-Language-Programmin
📡- -@HackLabel
Codeproject
40 Basic Practices in Assembly Language Programming - CodeProject
A discussion on some basic practices highly recommended in Assembly Language Programming.
practical-binary-analysis.pdf
15.9 MB
Practical Binary Analysis
build your own Linux tool for Binary Instrumentation, Analysis and Disassesmbly
📡- @hackLabel
build your own Linux tool for Binary Instrumentation, Analysis and Disassesmbly
📡- @hackLabel
👍2❤🔥1
Alcatraz is a x64 binary obfuscator that is able to obfuscate various different pe files including: .exe .dll .sys
https://github.com/weak1337/Alcatraz
📡- @hackLabel
https://github.com/weak1337/Alcatraz
📡- @hackLabel
❤🔥2👍1
This repo contains resources/notes/blogs I've found on the interwebz related to #binary #exploitation and internals in general. I hope you find them as useful as I did.
https://github.com/Tzaoh/pwning
📡- @hackLabel
https://github.com/Tzaoh/pwning
📡- @hackLabel
GitHub
GitHub - Tzaoh/pwning: RE / Binary Exploitation Resources
RE / Binary Exploitation Resources. Contribute to Tzaoh/pwning development by creating an account on GitHub.
Getting Started with Exploit Development
https://dayzerosec.com/blog/2021/02/02/getting-started.html
Prerequisites:
• C programming language
• x86 Assembly (32bit and 64bit)
• Linux terminal usage
📡- @hackLabel
https://dayzerosec.com/blog/2021/02/02/getting-started.html
Prerequisites:
• C programming language
• x86 Assembly (32bit and 64bit)
• Linux terminal usage
📡- @hackLabel
dayzerosec
Getting Started with Exploit Development
This post has been updated
https://dayzerosec.com/blog/2024/07/11/getting-started-2024.html
Removing the Open Security Training from my recommendations kinda messed with the flow of these recommendations. So it triggered me to rework all the recommendations…
https://dayzerosec.com/blog/2024/07/11/getting-started-2024.html
Removing the Open Security Training from my recommendations kinda messed with the flow of these recommendations. So it triggered me to rework all the recommendations…
👍1