ебейшая статья по внутренностям питона, китаец просто разьебал таск
https://evilpan.com/2020/10/11/protected-python/#%e7%a4%ba%e4%be%8b
кстати в его блоге есть еще охуеные статьи
https://evilpan.com/2020/10/11/protected-python/#%e7%a4%ba%e4%be%8b
кстати в его блоге есть еще охуеные статьи
有价值炮灰
如何破解一个Python虚拟机壳并拿走12300元ETH
之前在群里看到有人发了一个挑战,号称将 5 ETH 的私钥放在了加密的代码中,只要有人能解密就可以取走,所以我又管不住自己这双手了。
This is a web-based assembler and disassembler, utilizing GNU Binutils and ported to WebAssembly, thus functioning as a purely static website.
https://binutils-wasm.vercel.app/
https://binutils-wasm.vercel.app/
CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as Administrator.
https://github.com/hackerhouse-opensource/Stinger
https://github.com/hackerhouse-opensource/Stinger
GitHub
GitHub - hackerhouse-opensource/Stinger: CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated…
CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as Administrator. - hackerhouse-opensource/Stinger
We hacked into Apple Travel Portal (yes, again!) using a 0-day Remote Code Execution exploit. Part 1 is live now, stay tuned for the follow-up on another RCE worth a total bounty of $40k!
https://blog.projectdiscovery.io/hello-lucee-let-us-hack-apple-again/
https://blog.projectdiscovery.io/hello-lucee-let-us-hack-apple-again/
ProjectDiscovery
Hello Lucee! Let us hack Apple again? — ProjectDiscovery Blog
Last year we conducted an in-depth analysis of multiple vulnerabilities within Adobe ColdFusion, we derived valuable insights, one of which revolved around CFM and CFC handling, parsing and execution. We wondered if there are any other CFML Servers. Does…
Understanding Internals of SmokeLoader
https://irfan-eternal.github.io/understanding-internals-of-smokeloader/
https://irfan-eternal.github.io/understanding-internals-of-smokeloader/
irfan_eternal
Understanding Internals of SmokeLoader
Portable, simple and fast installer for Visual Studio Build Tools.
Downloads standalone 64-bit MSVC compiler, linker & other tools, also headers/libraries from Windows SDK, into a portable folder, without installing Visual Studio.
https://github.com/Data-Oriented-House/PortableBuildTools
Downloads standalone 64-bit MSVC compiler, linker & other tools, also headers/libraries from Windows SDK, into a portable folder, without installing Visual Studio.
https://github.com/Data-Oriented-House/PortableBuildTools
GitHub
GitHub - Data-Oriented-House/PortableBuildTools: Portable VS Build Tools installer
Portable VS Build Tools installer. Contribute to Data-Oriented-House/PortableBuildTools development by creating an account on GitHub.
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment
https://rootkits.xyz/blog/2017/06/kernel-setting-up/
https://rootkits.xyz/blog/2017/06/kernel-setting-up/
rootkit
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment - rootkit
Intro Recently, I had the pleasure to attend the training on Windows Kernel Exploitation at nullcon by the HackSysTeam. The training was well executed, and I got the intro into the world of kernel. But, as you know, nobody could teach you internals about…
Keylogging in the Windows kernel with undocumented data structures
https://eversinc33.com/posts/kernel-mode-keylogging/
https://eversinc33.com/posts/kernel-mode-keylogging/
SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem
https://www.ndss-symposium.org/wp-content/uploads/2024-926-paper.pdf
https://www.ndss-symposium.org/wp-content/uploads/2024-926-paper.pdf
Unveiling custom packers: A comprehensive guide
https://estr3llas.github.io/unveiling-custom-packers-a-comprehensive-guide/
https://estr3llas.github.io/unveiling-custom-packers-a-comprehensive-guide/
Estrellas’s Blog
Unveiling custom packers: A comprehensive guide
In this article, you'll be diving into an introduction to how packers work, some tips to unpack, and two walkthroughs showing off how i usually deal with custom packers.