This is a web-based assembler and disassembler, utilizing GNU Binutils and ported to WebAssembly, thus functioning as a purely static website.
https://binutils-wasm.vercel.app/
https://binutils-wasm.vercel.app/
CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as Administrator.
https://github.com/hackerhouse-opensource/Stinger
https://github.com/hackerhouse-opensource/Stinger
GitHub
GitHub - hackerhouse-opensource/Stinger: CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated…
CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as Administrator. - hackerhouse-opensource/Stinger
We hacked into Apple Travel Portal (yes, again!) using a 0-day Remote Code Execution exploit. Part 1 is live now, stay tuned for the follow-up on another RCE worth a total bounty of $40k!
https://blog.projectdiscovery.io/hello-lucee-let-us-hack-apple-again/
https://blog.projectdiscovery.io/hello-lucee-let-us-hack-apple-again/
ProjectDiscovery
Hello Lucee! Let us hack Apple again? — ProjectDiscovery Blog
Last year we conducted an in-depth analysis of multiple vulnerabilities within Adobe ColdFusion, we derived valuable insights, one of which revolved around CFM and CFC handling, parsing and execution. We wondered if there are any other CFML Servers. Does…
Understanding Internals of SmokeLoader
https://irfan-eternal.github.io/understanding-internals-of-smokeloader/
https://irfan-eternal.github.io/understanding-internals-of-smokeloader/
irfan_eternal
Understanding Internals of SmokeLoader
Portable, simple and fast installer for Visual Studio Build Tools.
Downloads standalone 64-bit MSVC compiler, linker & other tools, also headers/libraries from Windows SDK, into a portable folder, without installing Visual Studio.
https://github.com/Data-Oriented-House/PortableBuildTools
Downloads standalone 64-bit MSVC compiler, linker & other tools, also headers/libraries from Windows SDK, into a portable folder, without installing Visual Studio.
https://github.com/Data-Oriented-House/PortableBuildTools
GitHub
GitHub - Data-Oriented-House/PortableBuildTools: Portable VS Build Tools installer
Portable VS Build Tools installer. Contribute to Data-Oriented-House/PortableBuildTools development by creating an account on GitHub.
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment
https://rootkits.xyz/blog/2017/06/kernel-setting-up/
https://rootkits.xyz/blog/2017/06/kernel-setting-up/
rootkit
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment - rootkit
Intro Recently, I had the pleasure to attend the training on Windows Kernel Exploitation at nullcon by the HackSysTeam. The training was well executed, and I got the intro into the world of kernel. But, as you know, nobody could teach you internals about…
Keylogging in the Windows kernel with undocumented data structures
https://eversinc33.com/posts/kernel-mode-keylogging/
https://eversinc33.com/posts/kernel-mode-keylogging/
SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem
https://www.ndss-symposium.org/wp-content/uploads/2024-926-paper.pdf
https://www.ndss-symposium.org/wp-content/uploads/2024-926-paper.pdf
Unveiling custom packers: A comprehensive guide
https://estr3llas.github.io/unveiling-custom-packers-a-comprehensive-guide/
https://estr3llas.github.io/unveiling-custom-packers-a-comprehensive-guide/
Estrellas’s Blog
Unveiling custom packers: A comprehensive guide
In this article, you'll be diving into an introduction to how packers work, some tips to unpack, and two walkthroughs showing off how i usually deal with custom packers.
Automating Qakbot Malware Analysis with Binary Ninja
https://invokere.com/posts/2024/02/automating-qakbot-malware-analysis-with-binary-ninja/
https://invokere.com/posts/2024/02/automating-qakbot-malware-analysis-with-binary-ninja/
Invokere
Automating Qakbot Malware Analysis with Binary Ninja
Throughout this blog post we provide Binary Ninja automation strategies for analyzing obfuscation techniques implemented by Qakbot.
This media is not supported in your browser
VIEW IN TELEGRAM
Когда накопил денег на IDA PRO