#loader #crypter #edr_bypass #malware #ppl
@ZwLowLevel
https://www.elastic.co/security-labs/roningloader
Please open Telegram to view this post
VIEW IN TELEGRAM
www.elastic.co
RONINGLOADER: DragonBreath’s New Path to PPL Abuse — Elastic Security Labs
Elastic Security Labs uncovers RONINGLOADER, a multi-stage loader deploying DragonBreath’s updated gh0st RAT variant. The campaign weaponizes signed drivers, thread-pool injection, and PPL abuse to disable Defender and evade Chinese EDR tools.
#xbox360 #os_internals #debugging #low_level
@ZwLowLevel
https://randomascii.wordpress.com/2018/01/07/finding-a-cpu-design-bug-in-the-xbox-360/
Please open Telegram to view this post
VIEW IN TELEGRAM
Random ASCII - tech blog of Bruce Dawson
Finding a CPU Design Bug in the Xbox 360
The recent reveal of Meltdown and Spectre reminded me of the time I found a related design bug in the Xbox 360 CPU – a newly added instruction whose mere existence was dangerous. Back in 2005 I was…
This media is not supported in your browser
VIEW IN TELEGRAM
#macos #ios #reverse_engineering #reversing
@ZwLowLevel
https://hexai.re/blog/reversing-swift-like-a-pro
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Header‑only C++ library for Native API syscall invocation on x64 Windows
#syscall #windows_internals #ntapi
@ZwLowLevel
https://github.com/wufhex/Syscaller
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - wufhex/Syscaller: Header‑only C++ library for Native API syscall invocation on x64 Windows
Header‑only C++ library for Native API syscall invocation on x64 Windows - wufhex/Syscaller
#amr64 #os_internals #raspberry
@ZwLowLevel
https://ohyaan.github.io/assembly/introduction_to_arm64_assembly_on_raspberry_pi/
Please open Telegram to view this post
VIEW IN TELEGRAM
Raspberry Pi Complete Guide
Raspberry Pi User Guide - Complete Tutorials and Tips
Master Raspberry Pi with our comprehensive guides covering setup, programming, troubleshooting, and advanced projects.
#android #framework
@ZwLowLevel
https://github.com/AlbatrossHook/AlbatrossServer
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - AlbatrossHook/AlbatrossServer: Albatross Server is the core component of the Albatross dynamic instrumentation tool. It…
Albatross Server is the core component of the Albatross dynamic instrumentation tool. It enables Albatross not only to be packaged into an app but also to be dynamically injected. It is responsible...
Forwarded from Golden Byte
🛜 TP-Link-TL-WA1201-Vulnerability-Analysis
Hardware Teardown and Firmware Vulnerability Analysis
Hardware Teardown and Firmware Vulnerability Analysis
#firmware_hacking #firmware_analysis #hardware_hacking #reverse_engineering
@ZwLowLevel
https://github.com/codyaj/TP-Link-TL-WA1201-Vulnerability-Analysis
GitHub
GitHub - codyaj/TP-Link-TL-WA1201-Vulnerability-Analysis: Hardware & firmware security analysis of the TP-Link AC1200. Gained root…
Hardware & firmware security analysis of the TP-Link AC1200. Gained root shell via UART & U-Boot to dump firmware for vulnerability research. - codyaj/TP-Link-TL-WA1201-Vulnerability-Analysis
Forwarded from CyberSecurityTechnologies
#AIOps
#MLSecOps
#RAG_Security
#Offensive_security
AI pentest scoping playbook
https://devansh.bearblog.dev/ai-pentest-scoping
// Scoping AI security engagements is harder than traditional pentests because the attack surface is larger, the risks are novel, and the methodologies are still maturing
#MLSecOps
#RAG_Security
#Offensive_security
AI pentest scoping playbook
https://devansh.bearblog.dev/ai-pentest-scoping
// Scoping AI security engagements is harder than traditional pentests because the attack surface is larger, the risks are novel, and the methodologies are still maturing
pwndbg
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
#reverse_engineering #windbg #pwndbg #malware_analysis
@ZwLowLevel
https://github.com/pwndbg/pwndbg
GitHub
GitHub - pwndbg/pwndbg: Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy - pwndbg/pwndbg
Windows 11 24h2 LPE Kernel Exploitation. CVE-2020-12446(eneio64.sys)
#windows_kernel #kernel_exploit #cve
@ZwLowLevel
https://github.com/enessakircolak/Windows-11-24h2-Kernel-Exploit
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - enessakircolak/Windows-11-24h2-Kernel-Exploit: Windows 11 24h2 LPE Kernel Exploitation. CVE-2020-12446(eneio64.sys)
Windows 11 24h2 LPE Kernel Exploitation. CVE-2020-12446(eneio64.sys) - enessakircolak/Windows-11-24h2-Kernel-Exploit
#ntfs #file_system #mft #windows_internals
@ZwLowLevel
https://hackmag.com/security/ntfs-inside
Please open Telegram to view this post
VIEW IN TELEGRAM
HackMag
Inside NTFS: The Windows Master File Table (MFT) Internals Explained
Tech magazine for cybersecurity specialists
FunkSec – Alleged Top Ransomware Group Powered by AI
#ransomware #ai #funksec
#ransomware #ai #funksec
@ZwLowLevel
https://research.checkpoint.com/2025/funksec-alleged-top-ransomware-group-powered-by-ai/
Forwarded from ARVIN
Nation-State Actor’s Arsenal: An In-Depth Look at Lazarus’ ScoringMathTea
https://0x0d4y.blog/arsenal-analysis-of-a-nation-state-actor-an-in-depth-look-at-lazarus-scoringmathtea
https://0x0d4y.blog/arsenal-analysis-of-a-nation-state-actor-an-in-depth-look-at-lazarus-scoringmathtea