Source Byte – Telegram
Source Byte
7.77K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
ConfuserEx2 - Full Deobfuscation Guide

Link

#reverse
@islemolecule_source
A detailed analysis of the Menorah malware used by APT34

Link


#malware_analysis
@islemolecule_source
Octo Banking Botnet [ Source Code ] Leaked

Link

Note: ONLY DEBIAN 11 6 gb RAM / 100 GB / 3 cores, Server Internet speed 100 megabytes


open in VM

#leaked
@islemolecule_source
OctoBankingBotnet.zip
33.4 MB
Forwarded from Anastasia 🐞
Source Byte
Voice message
This media is not supported in your browser
VIEW IN TELEGRAM
The Evolution of Protected Processes – Part 1
link

The Evolution of Protected Processes – Part 2
link

#windows
#threat_hunting
@islemolecule_source
Why Protected Processes Are A Bad Idea
Link

#windows #threat_hunting
@islemolecule_source
Microsoft Open Source Code of Conduct
(implement of DNS , AMASI ,....)
LInK

#windows
#win_api
@islemolecule_source
F#ck AMSI! How to bypass Antimalware Scan Interface and infect Windows

https://hackmag.com/security/fck-amsi/

#windows
#malware_dev
@islemolecule_source
The internals of Javanoscript Engine!
https://youtube.com/watch?v=qf1KhBCaWNY

The execution context and stack in Javanoscript!
https://youtube.com/watch?v=3Ywr7MPxBKA

Execution Stack in Chrome: Live Demo!
https://youtube.com/watch?v=-UnIbstX_0A

The what and why of max call stack in Javanoscript!
https://youtube.com/watch?v=qc3aEKrohKc

#javanoscript_internals , #javanoscript_engine
———
@islemolecule_source
Forwarded from VX-SH
VT Query - behaviour:Local\\Kasimir_* AND behaviour:Local\\azov AND tag:64bits AND (behaviour_files:RESTORE_FILES OR behaviour_registry:rdpclient.exe)
Tutorial - Writing Hardcoded Windows Shellcodes (32bit)

LinK


#shellcode
_____
@islemolecule_source