Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
pe-file-format-compendium-11-by-goppit-arteam.pdf
5.2 MB
Explain pe file format from ARteam

#pe
❤‍🔥6
Most PE executables only have a DOS stub, but Robert Xiao combined DOOM Dos and Windows executables into a single universal file.

Advanced merge of genuine Dos headers, relocations, DOS4/GW headers and PE file.

https://github.com/nneonneo/universal-doom

#PE
intresting google dork by coinicap which show "national IDs"

site:https://test.com/ کارت ملی

i will not share the exact dork becuase of users privacy :)
❤‍🔥3
Source Byte pinned a photo
Malware Development for Dummies

In the age of EDR, red team operators cannot get away with using pre-compiled payloads anymore. As such, malware development is becoming a vital skill for any operator. This workshop will show you all you need to get started!

Slides:
https://github.com/chvancooten/maldev-for-dummies/tree/main/Slides

Exercises:
https://github.com/chvancooten/maldev-for-dummies/tree/main/Exercises

#malware_dev #csharp #nim #golang #rust
❤‍🔥2👍1
Should I share open-source tools that I find interesting? (to get ideas from them)
Anonymous Poll
89%
yes
11%
no
Best Way to Make Malware – List of Tutorials

Link

#malware_dev
We write our own malware. Part 1: Learning to write a completely “undetectable” keylogger

https://habr.com/en/companies/varonis/articles/302458/

#malware_dev
❤‍🔥1
❤‍🔥2
Malware analysis in Russian
(If you have En version of this pls share)
https://m.vk.com/wall-203365865_416

#malware_analysis
BM_1_22.pdf
32 MB
Black Mass vol.1 (30.10.2022) - collection of works exclusive to the release of this zine.

#Black_Mass
#Malware_analysis
👍2
(In)direct Syscalls: A journey from high to low
RedOps | Red Team Village | DEF CON 31

https://github.com/VirtualAlllocEx/DEFCON-31-Syscalls-Workshop

#malware_dev
#defcon
❤‍🔥1
A technique of hiding malicious shellcode via Shannon encoding

https://github.com/kleiton0x00/Shelltropy

#malware_dev
AtlasLdr

Reflective x64 PE/DLL Loader implemented using Dynamic Indirect Syscalls

Features:
* Retrieve of DLL and PE from a remote server
* Manual Mapping on a remote process
* Position independent code
* Use of indirect Syscalls
- ZwAllocateVirtualMemory
- ZwProtectVirtualMemory
- ZwQuerySystemInformation
- ZwFreeVirtualMemory
- ZwCreateThreadEx
* Single stub for all Syscalls
- Dynamic SSN retrieve
- Dynamic Syscall address resolution
* Atlas also uses
- LdrLoadDll
- NtWriteVirtualMemory
* Custom implementations of
- GetProcAddress
- GetModuleHandle
* API hashing
* Cleanup on error
* Variable EntryPoint
❤‍🔥21