Source Byte
#meme
nope
answer is windows
#CVE-2023-36003 (#Windows #LPE XAML diagnostics API)
Blog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/
PoC: https://github.com/m417z/CVE-2023-36003-POC
answer is windows
#CVE-2023-36003 (#Windows #LPE XAML diagnostics API)
Blog: https://m417z.com/Privilege-escalation-using-the-XAML-diagnostics-API-CVE-2023-36003/
PoC: https://github.com/m417z/CVE-2023-36003-POC
vmp-3.5.1.zip
20.2 MB
VMProtect Source Code (Leaked 07.12.2023)
https://github.com/jmpoep/vmprotect-3.5.1
#vmp #protector
@islemolecule_source
https://github.com/jmpoep/vmprotect-3.5.1
#vmp #protector
@islemolecule_source
Building a labeled malware corpus for YARA testing
credit : Steve Miller
https://stairwell.com/resources/quick-n-dirty-detection-research-building-a-labeled-malware-corpus-for-yara-testing/
#yara,
———
@islemolecule_source
credit : Steve Miller
https://stairwell.com/resources/quick-n-dirty-detection-research-building-a-labeled-malware-corpus-for-yara-testing/
#yara,
———
@islemolecule_source
How to Leverage Internal Proxies for Lateral Movement, Firewall Evasion, and Trust Exploitation
https://practicalsecurityanalytics.com/how-to-leverage-internal-proxies-for-lateral-movement-firewall-evasion-and-trust-exploitation
#red_team ,#lateral_movemnt
--------
@islemolecule_source
https://practicalsecurityanalytics.com/how-to-leverage-internal-proxies-for-lateral-movement-firewall-evasion-and-trust-exploitation
#red_team ,#lateral_movemnt
--------
@islemolecule_source
al-khaser is a PoC "malware" application with good intentions that aims to stress your anti-malware system.
Link
#malware_analysis #malware_dev
-----
@islemolecule_source
Link
#malware_analysis #malware_dev
-----
@islemolecule_source
This is a collection of #botnet source codes, unorganized.
Link
#malware_analysis #malware_dev
------
@islemolecule_source
Link
#malware_analysis #malware_dev
------
@islemolecule_source
Where to find C malware source code
Reddit
--------
#malware_analysis #malware_dev
--------
@islemolecule_source
--------
#malware_analysis #malware_dev
--------
@islemolecule_source
Linux process injection: sshd injection for credential harvesting
credits : @_xpn_ , @jm33_m0
blog.xpnsec.com/linux-proces…
jm33.me/sshd-injection-and-p…
#process_injection ,
———
@islemolecule_source
credits : @_xpn_ , @jm33_m0
blog.xpnsec.com/linux-proces…
jm33.me/sshd-injection-and-p…
#process_injection ,
———
@islemolecule_source
VBA: having fun with macros, overwritten pointers & R/W/X memory
credit : @AdeptsOf0xCC
https://adepts.of0x.cc/vba-hijack-pointers-rwa/
#macro , #VBA , #shellcode
———
@islemolecule_source
credit : @AdeptsOf0xCC
https://adepts.of0x.cc/vba-hijack-pointers-rwa/
#macro , #VBA , #shellcode
———
@islemolecule_source
Source Byte
Oh, cool! Looks like VT supports logical operators with VTGrep, so you can almost do yara searches in an indexed (read: fast) way. e.g. #tweet
When helping with mquery development I wrote a small converter that takes in a Yara rule and produces a simple byte-based query as output: https://github.com/CERT-Polska/mquery/blob/master/src/lib/yaraparse.py
You could probably modify it a bit to create queries compatible with VT content search
#tweet
You could probably modify it a bit to create queries compatible with VT content search
#tweet
Potential Sliver C2's (239 C2's)
credit : @embee_research
Simple query - based on "operators" and "multiplayer" certificate values related to Sliver Team Servers.
https://search.censys.io/search?
Gist - 43 IP's with 0 VT
LINK
Gist - All 239 IP's
LINK
credit : @embee_research
Simple query - based on "operators" and "multiplayer" certificate values related to Sliver Team Servers.
https://search.censys.io/search?
Gist - 43 IP's with 0 VT
LINK
Gist - All 239 IP's
LINK
[Infographic] High-level diagram showcasing Microsoft Defender for Cloud’s
https://raw.githubusercontent.com/JadKaraki/M365ZeroTrust/main/Defender%20for%20Cloud%20Diagram.jpg
Credit: Jad Karaki
#windows_defender
———
@islemolecule_source
https://raw.githubusercontent.com/JadKaraki/M365ZeroTrust/main/Defender%20for%20Cloud%20Diagram.jpg
Credit: Jad Karaki
#windows_defender
———
@islemolecule_source