Sec Note – Telegram
Sec Note
1.4K subscribers
83 photos
5 videos
31 files
155 links
Download Telegram
😄
Echo malware.secnote | cmd
👾8
Forwarded from Бaтepфляй 𓂅
VMProtect Ultimate Build 3.8.7.2001.zip
38.5 MB
sory this not pass

VMProtect Ultimate Build 3.8.7.2001 crack

https://www.virustotal.com/gui/file/902aa0a1ef80e0f7cabdbfbed01f2e9f39923c0ac4c57cf0343cbf1c934f093a?nocache=1

the file is not mine, run it strictly at your discretion on a virtual machine. I ran it, and everything worked as it should.
👾7
👾15
ChromElevator
Fully decrypt App-Bound Encrypted (ABE) cookies, passwords & payment methods from Chromium-based browsers (Chrome, Brave, Edge) - all in user mode, no admin rights required.


🕷 #stealer
👾5
Forwarded from encrypted.
White Matter. Vol 1. You Are (Not) Alone

Важный дисклеймер: Этот инструмент предназначен исключительно для образовательных целей и тестирования на системах, где у вас есть явное разрешение. Не используйте его для незаконного доступа к системам.
Автор инструмента не несет ответственности за ваши действия.

В этой части релиза я создал инструмент и бэкдор в одном лице, позволяющий взламывать SSH сервера и обычные системы со статическим IP-адресом, закрепляться в этих системах, перехватывать нажатия клавиш удаленно с помощью кейлоггера и прочие интересные возможности.

Ссылка на репо: https://github.com/lain0xff/White-Matter

#malware #offensive #white_matter
👾5
Forwarded from encrypted.
White Matter. Part 1. You Are (Not) Alone.pdf
904.1 KB
Также небольшое пояснение к коду.
👾4
Forwarded from /mdre/
Please open Telegram to view this post
VIEW IN TELEGRAM
👾5
VAC-Module-Dumper
Ever Wondered how an anti-cheat system is actually loaded into memory?

Aspasia - Counter-Strike 2 Reverse Engineering Framework


#gh #csgo
👾7
DotnetNoVirtualProtectShellcodeLoader
load shellcode without P/D Invoke and VirtualProtect call.

How
This code leverages built-in .NET functionality to allocate an RWX memory region and overwrite a C# method with your own shellcode using the RuntimeHelpers.PrepareMethod(handle) method.

https://github.com/Mr-Un1k0d3r/DotnetNoVirtualProtectShellcodeLoader
👾2
Forwarded from GangExposed
This media is not supported in your browser
VIEW IN TELEGRAM
The video shows 11 members of the Conti ransomware gang.

Dubai, UAE, February 2022

#GangExposed #Conti #Ransomware
👾11
WSASS
This is a tool that uses the old WerfaultSecure.exe program to dump the memory of processes protected by PPL (Protected Process Light), such as LSASS.EXE. The output is in Windows MINIDUMP format.


#lsass
👾4
1. ThreadStackSpoofer by mgeeky
Overview: This tool demonstrates an advanced in-memory evasion technique that spoofs the thread call stack. It's designed to bypass thread-based memory examination rules, making it harder for analysts to detect injected shellcode within process memory.

- [ThreadStackSpoofer GitHub Repository]


2. CallStackSpoofer by WithSecureLabs
Overview: This proof-of-concept implementation demonstrates how to spoof arbitrary call stacks during system calls, such as NtOpenProcess. It's a more advanced technique that builds upon the concepts introduced in ThreadStackSpoofer.

- [CallStackSpoofer GitHub Repository]


3. Draugr by NtDallas
Overview: Draugr is a Cobalt Strike Beacon
Object File (BOF) template that facilitates the creation of synthetic stack frames, effectively spoofing the call stack during execution. It utilizes gadgets from KERNELBASE.DLL to achieve this

- [Draugr GitHub Repository]


4. LoudSunRun by susMdT
Overview: LoudSunRun is a technique that involves stack spoofing with synthetic frames. It calculates the total stack size of fake frames and adjusts stack arguments accordingly to obscure the true execution path.

- [LoudSunRun GitHub Repository]


5. BokuLoader by boku7
Overview: BokuLoader is a proof-of-concept Cobalt Strike Reflective Loader that aims to recreate, integrate, and enhance Cobalt Strike's evasion features. It combines various evasion techniques, including call stack spoofing, to achieve stealthy execution.

- [BokuLoader GitHub Repository]


https://dtsec.us/2023-09-15-StackSpoofin/

#Loader #callstack
👾4