Source Byte – Telegram
Source Byte
7.76K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
• Realistic “photos” were published on Reddit , which were generated by AI and are great for identity verification)) In one photo there is a girl with a sign, and in the second - with an ID card.

LINK

#informative
VirtualBox internals and exploitation (CVE-2023-21987 and CVE-2023-21991)

credit : @qriousec

https://qriousec.github.io/post/vbox-pwn2own-2023/

#virtualbox , #analysis ,
———
@islemolecule_source
Ghidra vs Cutter vs Binary Ninja vs IDA Free
(Ida ❤️)
Link

#disassembler
@islemolecule_source
Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer

Link

#malware_analysis
@islemolecule_source
exploits_rootkits_in_browser_extensions.pdf
2 MB
Exploits and rootkits in your browser extensions

DEFCON 2021.
Forwarded from BlankRoom
Source Cocde qBit Stealer

Hello, qBit Stealer is a stealer malware designed with the red teamer in mind. It is completely written in Go, not detectable by EDRs, and is capable of uploading any file to locker of your choice. Utilizing cutting-edge con-currency engine to upload as fast as possible


Download Download


Password : blankroom

@Bl4nk_Room

Enjoy!
Azure AD Security Config Analyzer (AADSCA)
https://github.com/Cloud-Architekt/AzureAD-Attack-Defense/blob/main/AADSecurityConfigAnalyzer.md

Credit: Thomas Naunheim, Sami Lamppu & Markus Pitkäranta

#MicrosoftAzure #shiftavenue , #tool
———
@islemolecule_source
MuddyWater APT 🇮🇷 targeting telecoms orgs in North and East Africa with custom tools.
credit : @1ZRR4H

Tracking #MuddyC2Go servers with:
- Shodan: LINK
- Censys: LINK

Active C&C servers:
http://94.131.98[.]14:443/
http://95.164.38[.]99:443/
http://94.131.109[.]65:443/
http://45.67.230[.]91:443/
http://45.150.64[.]39:443/

[+] MuddyC2Go PowerShell launcher: LINK
REF: LINK
idapw.pdf
529.2 KB
IDA Plugin Writing Tutorial

credit : http://www.openrce.org/

#old_but_gold
Windows exploit development resources

Link


#windows
@islemolecule_source
Internals of compilers, linkers, JITs and assemblers with focus on software security hardening)

Low-Level Software Security for Compiler Developers:
https://llsoftsec.github.io/llsoftsecbook/

#internals , #linker
———
@islemolecule_source
Remember #stuxnet ? It was Dutch Erik van Sabben who planted the bug in Iran. I've seen it in Dutch news channels, will pop up internationally any minute I guess.

https://nos.nl/artikel/2504114-nederlander-saboteerde-atoomcomplex-in-iran-den-haag-wist-niets

#tweet
credit : @CisoDiagonal
Source Byte pinned «Remember #stuxnet ? It was Dutch Erik van Sabben who planted the bug in Iran. I've seen it in Dutch news channels, will pop up internationally any minute I guess. https://nos.nl/artikel/2504114-nederlander-saboteerde-atoomcomplex-in-iran-den-haag-wist-niets…»
Forwarded from Zer0Day Lab
Please open Telegram to view this post
VIEW IN TELEGRAM
Concealed code execution: Techniques and detection
(Process Tampering)
Link

#malware_dev
@islemolecule_source