Source Byte – Telegram
Source Byte
7.77K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
The internals of Javanoscript Engine!
https://youtube.com/watch?v=qf1KhBCaWNY

The execution context and stack in Javanoscript!
https://youtube.com/watch?v=3Ywr7MPxBKA

Execution Stack in Chrome: Live Demo!
https://youtube.com/watch?v=-UnIbstX_0A

The what and why of max call stack in Javanoscript!
https://youtube.com/watch?v=qc3aEKrohKc

#javanoscript_internals , #javanoscript_engine
———
@islemolecule_source
Forwarded from VX-SH
VT Query - behaviour:Local\\Kasimir_* AND behaviour:Local\\azov AND tag:64bits AND (behaviour_files:RESTORE_FILES OR behaviour_registry:rdpclient.exe)
Tutorial - Writing Hardcoded Windows Shellcodes (32bit)

LinK


#shellcode
_____
@islemolecule_source
Flying Under the Radar: Abusing GitHub for Malicious Infrastructure

https://www.recordedfuture.com/flying-under-the-radar-abusing-github-malicious-infrastructure

#c2 ,
———
@islemolecule_source
👍1
Forwarded from Private Shizo
Forwarded from Private Shizo
RedEye.zip
5.5 MB
🔥RedEye is an open-source analytic tool developed by CISA and DOE’s Pacific Northwest National Laboratory to assist Red Teams with visualizing and reporting command and control activities. This tool allows an operator to assess and display complex data, evaluate mitigation strategies, and enable effective decision making in response to a Red Team assessment. The tool parses logs, such as those from Cobalt Strike, and presents the data in an easily digestible format. The users can then tag and add comments to activities displayed within the tool.

RedEye can assist an operator to efficiently:
⚙️Replay and demonstrate Red Team’s assessment activities as they occurred rather than manually pouring through thousands of lines of log text.
⚙️Display and evaluate complex assessment data to enable effective decision making.
⚙️Gain a clearer understanding of the attack path taken and the hosts compromised during a Red Team assessment or penetration test.
An aggressor noscript that can help automate payload building in Cobalt Strike

https://github.com/Workingdaturah/Payload-Generator

#c2 ,#Cobalt_Strike
———
@islemolecule_source
pafish -malware source code
(different techniques to detect virtual machines)
Link

#malware_analysis #malware_dev

@islemolecule_source
Source:
Handle-Ripper(Handle hijacking)
Link


#malware_dev
@islemolecule_source
vmp-3.5.1.zip
20.2 MB