Forwarded from zerodaytraining
Building kvm from source code https://youtu.be/UjquIFS2wQI
Forwarded from zerodaytraining
Remote kernel debugging the KVM hypervisor (full walkthrough video): https://youtu.be/cNfe4SguEYw
KVM is distinguished from Qemu: the latter runs in user mode to handle device virtualization, while the former runs in privileged kernel to implement just the core hypervisor functionality (VMM). KVM-Qemu combo is a popular choice for full system virtualization on Linux platform, but actually, both KVM and Qemu are self-contained tools that can virtualize stand-alone with certain technical restrictions; KVM being the hardest to attack. @alisaesage
KVM is distinguished from Qemu: the latter runs in user mode to handle device virtualization, while the former runs in privileged kernel to implement just the core hypervisor functionality (VMM). KVM-Qemu combo is a popular choice for full system virtualization on Linux platform, but actually, both KVM and Qemu are self-contained tools that can virtualize stand-alone with certain technical restrictions; KVM being the hardest to attack. @alisaesage
Forwarded from white2hack 📚
eCRE - Reverse Engineering Professional.rar
1.3 GB
eCRE – Reverse Engineering Professional, INE Version, 2021
Forwarded from r3v notes
#research #firmware
How To Do Firmware Analysis. Tools, Tips, and Tricks
https://www.pentestpartners.com/security-blog/how-to-do-firmware-analysis-tools-tips-and-tricks/
How To Do Firmware Analysis. Tools, Tips, and Tricks
https://www.pentestpartners.com/security-blog/how-to-do-firmware-analysis-tools-tips-and-tricks/
Pen Test Partners
How To Do Firmware Analysis. Tools, Tips, and Tricks | Pen Test Partners
So, you’ve got a firmware dump. Perhaps a raw read off a chip? An update file you downloaded off the internet? Now what? Taking a firmware dump and turning it into something useful can sometimes be painful. Sometimes you’ll be faced with proprietary (barely…
Forwarded from APT
If you want to take a happy little journey through PEB structs, PE headers and kernel32.dll Export Table to spawn some "calc.exe" on x64 using Assembly, here it is.
📚 What you will learn:
— WinAPI function manual location with Assembly;
— PEB Structure and PEB_LDR_DATA;
— PE File Structure;
— Relative Virtual Address calculation;
— Export Address Table (EAT);
— Windows x64 calling-convention in practice;
— Writing in Assembly like a real Giga-Chad...
🔗 Source:
https://print3m.github.io/blog/x64-winapi-shellcoding
#maldev #winapi #x64 #shellcode #assembly
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4❤🔥2
Ребята сделали чатик для ру читдев камунити
Думаю, многим оно зайдёт👋
https://news.1rj.ru/str/makingcheat
Думаю, многим оно зайдёт
https://news.1rj.ru/str/makingcheat
Please open Telegram to view this post
VIEW IN TELEGRAM
Telegram
CheatXplorer #cheatdev
первое русскоязычное коммьюнити читеров в телеграм
правила: https://github.com/sapdragon/cheatxplorer/blob/main/readme.md
правила: https://github.com/sapdragon/cheatxplorer/blob/main/readme.md
❤🔥3❤1
Forwarded from Proxy Bar
Malware Development
*
Part I - Analysis and DFIR Series
Part II - Analysis and DFIR Series
Part III - Analysis and DFIR Series
Part IV - Analysis and DFIR Series
#malware
*
Part I - Analysis and DFIR Series
Part II - Analysis and DFIR Series
Part III - Analysis and DFIR Series
Part IV - Analysis and DFIR Series
#malware
❤4
Поскольку контента нет, напомню, что есть бложик с каким-то количество всяких статей
ブログ.きく.コム
В том числе подборка кучи всяких полезностей, связанных с ревёрсом
ブログ.きく.コム/2021/10/02/Reverse-Engineering-Roadmap/
😎 ❤️
ブログ.きく.コム
В том числе подборка кучи всяких полезностей, связанных с ревёрсом
ブログ.きく.コム/2021/10/02/Reverse-Engineering-Roadmap/
Please open Telegram to view this post
VIEW IN TELEGRAM
Windows Internals Blog
Reverse Engineering Roadmap
Склад / Чулан / Сундук ссылок на всё, что только можно, связанное с ревёрсом / книжечки / курсы / много инфы
❤🔥10🐳3❤2
Forwarded from linkmeup
Абсолютно безумный плейлист, в котором автор пилит свою ОСь на ассемблере. Пилит уже два года, продвигается как продвигается, подробно всё объясняет.
Заморочь, однозначно, не для слабых духом.
https://www.youtube.com/playlist?list=PL5r5Q39GjMDcAKGSb5L035YrKK0rr8jM1
Заморочь, однозначно, не для слабых духом.
https://www.youtube.com/playlist?list=PL5r5Q39GjMDcAKGSb5L035YrKK0rr8jM1
YouTube
Operating System Development
Share your videos with friends, family, and the world
❤🔥10
Reverse Dungeon
https://www.youtube.com/watch?v=5HKSeLSIya4
YouTube
LLVM IR training at Intel (in Russian)
Эта лекция посвящена LLVM IR, как с точки зрения пользователя, желающего лучше понять промежуточное представление в компиляторе, так и с точки зрения программиста.
Этой лекцией я начинаю серию видео, посвященных использованию LLVM и Clang, их внутреннему…
Этой лекцией я начинаю серию видео, посвященных использованию LLVM и Clang, их внутреннему…
❤1🐳1
Forwarded from Order of Six Angles
exploit code for CVE-2024-38054
https://github.com/Black-Frost/windows-learning/tree/main/CVE-2024-38054
https://github.com/Black-Frost/windows-learning/tree/main/CVE-2024-38054
GitHub
windows-learning/CVE-2024-38054 at main · Black-Frost/windows-learning
Contribute to Black-Frost/windows-learning development by creating an account on GitHub.