Source Byte – Telegram
Source Byte
7.76K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Malware_Development_for_Dummies_Hack_in_Paris_30_06_2022_&_01_07.pdf
804.8 KB
Hack in paris: Malware development for dummies

#malware_dev
@islemolecule_source
Forwarded from vx-underground
CobaltStrike.rar
37 MB
93 cobalt strike beacons:)
x86 Nirvana Hooks & Manual Syscall Detection
credit : @xenosCR

https://blog.xenoscr.net/2022/01/17/x86-Nirvana-Hooks.html

#syscall ,
———
@islemolecule_source
awesome malware analysis tools and resources

Github
_____
@islemolecule_source
Quickly develop malware and bypass 90% of anti-virus software

Credit: Yu Cuan

Link

#malware_dev
_-------
@islemolecule_source
10 Underrated Resources about Malware Techniques

Credit: Thomas Roccia
Link

#malware_dev #malware_analysis
----------------------------------
@islemolecule_source
cff51698592467.pdf
11.7 MB
Black Mass" Volume 2 - Malware Development Guide

#Black_Mass
#VX_Underground
#malware_dev
@islemolecule_source
[ EDRSilencer ]

A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the server.

EDR list:

Microsoft Defender for Endpoint and Microsoft Defender Antivirus
"MsMpEng.exe",
"MsSense.exe",
Elastic EDR
"elastic-agent.exe",
"elastic-endpoint.exe",
"filebeat.exe",
Trellix EDR
"xagt.exe"

https://github.com/netero1010/EDRSilencer

#EDR

@islemolecule_source
Forwarded from [Channel] Private
Forwarded from [Channel] Private
x86_harmful.pdf
344.7 KB
Lolbin Attack & Defense.pdf.pdf
2.6 MB
📘LOLBIN ATTACK & DEFENSE🛠

@islemolecule_source
#lolbin
#malware_dev
Shellcode_Dvlp.pdf
3.4 MB
"Shellcode Development", 2023

#shellcode
#malware_dev
@islemolecule_source
analyzing-decompiled-C++vtables-and-objects-in-GCC-binaries.pdf
973.6 KB
analyzing-decompiled-C++

#reverse

@islemolecule_source
PingRAT: secretly passes C2 traffic through firewalls using ICMP payloads

https://github.com/umutcamliyurt/PingRAT

#c2 ,#tool , #go
———
@islemolecule_source
PSRansom: a PowerShell Ransomware Simulator with C2 Server capabilities.

https://github.com/JoelGMSec/PSRansom

#c2 , #powershell , #simulat , #tool
———
@islemolecule_source
How to break bare metal firmware encryption (FortiGate firewalls) for security research.
Credits: Jon Williams (@bishopfox)

https://bishopfox.com/blog/breaking-fortinet-firmware-encryption

#firewall, #fortigate ,
———
@islemolecule_source