An aggressor noscript that can help automate payload building in Cobalt Strike
https://github.com/Workingdaturah/Payload-Generator
#c2 ,#Cobalt_Strike
———
@islemolecule_source
https://github.com/Workingdaturah/Payload-Generator
#c2 ,#Cobalt_Strike
———
@islemolecule_source
pafish -malware source code
(different techniques to detect virtual machines)
Link
#malware_analysis #malware_dev
@islemolecule_source
(different techniques to detect virtual machines)
Link
#malware_analysis #malware_dev
@islemolecule_source
Source Byte
#meme
nope
answer is windows
#CVE-2023-36003 (#Windows #LPE XAML diagnostics API)
Blog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/
PoC: https://github.com/m417z/CVE-2023-36003-POC
answer is windows
#CVE-2023-36003 (#Windows #LPE XAML diagnostics API)
Blog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/
PoC: https://github.com/m417z/CVE-2023-36003-POC
vmp-3.5.1.zip
20.2 MB
VMProtect Source Code (Leaked 07.12.2023)
https://github.com/jmpoep/vmprotect-3.5.1
#vmp #protector
@islemolecule_source
https://github.com/jmpoep/vmprotect-3.5.1
#vmp #protector
@islemolecule_source
Building a labeled malware corpus for YARA testing
credit : Steve Miller
https://stairwell.com/resources/quick-n-dirty-detection-research-building-a-labeled-malware-corpus-for-yara-testing/
#yara,
———
@islemolecule_source
credit : Steve Miller
https://stairwell.com/resources/quick-n-dirty-detection-research-building-a-labeled-malware-corpus-for-yara-testing/
#yara,
———
@islemolecule_source
How to Leverage Internal Proxies for Lateral Movement, Firewall Evasion, and Trust Exploitation
https://practicalsecurityanalytics.com/how-to-leverage-internal-proxies-for-lateral-movement-firewall-evasion-and-trust-exploitation
#red_team ,#lateral_movemnt
--------
@islemolecule_source
https://practicalsecurityanalytics.com/how-to-leverage-internal-proxies-for-lateral-movement-firewall-evasion-and-trust-exploitation
#red_team ,#lateral_movemnt
--------
@islemolecule_source
al-khaser is a PoC "malware" application with good intentions that aims to stress your anti-malware system.
Link
#malware_analysis #malware_dev
-----
@islemolecule_source
Link
#malware_analysis #malware_dev
-----
@islemolecule_source
This is a collection of #botnet source codes, unorganized.
Link
#malware_analysis #malware_dev
------
@islemolecule_source
Link
#malware_analysis #malware_dev
------
@islemolecule_source
Where to find C malware source code
Reddit
--------
#malware_analysis #malware_dev
--------
@islemolecule_source
--------
#malware_analysis #malware_dev
--------
@islemolecule_source
Linux process injection: sshd injection for credential harvesting
credits : @_xpn_ , @jm33_m0
blog.xpnsec.com/linux-proces…
jm33.me/sshd-injection-and-p…
#process_injection ,
———
@islemolecule_source
credits : @_xpn_ , @jm33_m0
blog.xpnsec.com/linux-proces…
jm33.me/sshd-injection-and-p…
#process_injection ,
———
@islemolecule_source
VBA: having fun with macros, overwritten pointers & R/W/X memory
credit : @AdeptsOf0xCC
https://adepts.of0x.cc/vba-hijack-pointers-rwa/
#macro , #VBA , #shellcode
———
@islemolecule_source
credit : @AdeptsOf0xCC
https://adepts.of0x.cc/vba-hijack-pointers-rwa/
#macro , #VBA , #shellcode
———
@islemolecule_source
Source Byte
Oh, cool! Looks like VT supports logical operators with VTGrep, so you can almost do yara searches in an indexed (read: fast) way. e.g. #tweet
When helping with mquery development I wrote a small converter that takes in a Yara rule and produces a simple byte-based query as output: https://github.com/CERT-Polska/mquery/blob/master/src/lib/yaraparse.py
You could probably modify it a bit to create queries compatible with VT content search
#tweet
You could probably modify it a bit to create queries compatible with VT content search
#tweet