📡 – Telegram
📡
535 subscribers
68 photos
10 videos
26 files
72 links
Download Telegram
👍2
Assembly Refresher . Shellcode Injection . Exploitation Scenarios . Reverse Engineering . Return Oriented Programming . Advanced Exploitation . Memory Errors . . .

youtube: https://www.youtube.com/@pwncollege/videos
site: https://pwn.college/

📡
@hackLabel
3
https://crackmes.one/ for increase your skills in reverse engineering and hacking.

discord: https://discord.com/invite/2pPV3yq

📡
@hackLabel
👍52
This media is not supported in your browser
VIEW IN TELEGRAM
How to create a SIM card dump for reverse engineering
Learn how to create an image of a SIM card, such that it can be analyzed later.

This method is universal and it works with any card type (ex: SIM, USIM, RUIM, Nextel) from any mobile operator in the world.

SIM Dump can be downloaded from this address: files.dekart.com/beta/SimDump-pteryx.zip

SIM Explorer is distributed here: http://www.dekart.com/products/card_m

youtube: https://www.youtube.com/watch?v=ocJ4_4ZlHQs

📡
@hackLabel
👍2❤‍🔥1🔥1😱1
Media is too big
VIEW IN TELEGRAM
Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKEN

Additionally, l am not a GSM technology engineer, nor a cryptography expert. I do my best to explain these concepts in a simple and easy to understand way. But due to my limited knowledge of these subjects, it's possible that some of this information may be incorrect or lacking context.

However, this video will still allow you to crack a real GSM capture file if you are able to follow along with my flip-flopping style of presentation. Haha. But please, only replicate this tutorial on GSM data that originated from YOUR OWN mobile phone. Do not attempt to decrypt private telecommunications from any other cellular subscriber, EVER.

youtube: https://www.youtube.com/watch?v=EFLvHMJ5PHk

📡
@hackLabel
4❤‍🔥1👍1
The Forensics Wiki is an open source website providing information related to digital forensics. The articles on the website cover a wide range of information from tools used during investigations to papers people and organizations that contribute to the field.
https://forensics.wiki/

For more information about Forensics Wiki on MediaWiki see:
• Transitioning Forensics Wiki to GitHub
• Contributions Forensics Wiki on MediaWiki

📡@hackLabel
1👌1
Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals

Chrome Browser Exploitation, Part 2: Introduction to Ignition, Sparkplug and JIT Compilation via TurboFan

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

📡
@hackLabel
MAC OS® X AND iOS INTERNALS
Book

📡@hackLabel
حِزْبَ اللَّهِ هُمُ الْغَالِبُونَ

#طوفان‌_الاقصی
🔥17🫡5👎4😁43❤‍🔥2👍1
IMSI-catcher
This program shows you IMSI numbers, country, brand and operator of cellphones around you.

/!\ This program was made to understand how GSM network work. Not for bad hacking !

github: https://github.com/Oros42/IMSI-catcher

📡
@hackLabel
2🔥1😍1
2017-09-25 SWGDE Recommendations for Cell Site Analysis.pdf
1.3 MB
SWGDE Recommendations for Cell Site Analysis

📡
@hackLabel
Get persistent reverse shell from Android app without visible permissions to make device unusable

This blog will introduce you how it is possible to write a persistent reverse shell app on Android without any user requested and visible permissions. Since such application has no permissions, it shouldn't be able to perform any task. Well, that isn't true. We will take a quick look on how Android permissions system works, how it is possible for such permissions-less shell app to execute remote Denial-Of-Service (DoS), list installed apps, reboot device and others. Besides that, I will show you how to identify such established reverse shell connection from your Android device and get rid of it.

https://www.mobile-hacker.com/2023/09/27/get-persistent-reverse-shell-from-android-app-without-visible-permissions-to-make-device-unusable/

📡
@hackLabel
👍21
👍2