Potential Sliver C2's (239 C2's)
credit : @embee_research
Simple query - based on "operators" and "multiplayer" certificate values related to Sliver Team Servers.
https://search.censys.io/search?
Gist - 43 IP's with 0 VT
LINK
Gist - All 239 IP's
LINK
credit : @embee_research
Simple query - based on "operators" and "multiplayer" certificate values related to Sliver Team Servers.
https://search.censys.io/search?
Gist - 43 IP's with 0 VT
LINK
Gist - All 239 IP's
LINK
[Infographic] High-level diagram showcasing Microsoft Defender for Cloud’s
https://raw.githubusercontent.com/JadKaraki/M365ZeroTrust/main/Defender%20for%20Cloud%20Diagram.jpg
Credit: Jad Karaki
#windows_defender
———
@islemolecule_source
https://raw.githubusercontent.com/JadKaraki/M365ZeroTrust/main/Defender%20for%20Cloud%20Diagram.jpg
Credit: Jad Karaki
#windows_defender
———
@islemolecule_source
OSINTBuddy - The Open-Source Alternative to Maltego ! Node graphs, OSINT data mining, and plugins. Connect unstructured and public data for transformative insights.
https://github.com/jerlendds/osintbuddy
https://github.com/jerlendds/osintbuddy
ER_01.pdf
4.1 MB
#reversing
"Exploiting Reversing (ER) series: Article 01", rev.A, April 2023.
]-> ER: article 02 (2024, .pdf):
https://exploitreversing.files.wordpress.com/2024/01/exploit_reversing_02.pdf
"Exploiting Reversing (ER) series: Article 01", rev.A, April 2023.
]-> ER: article 02 (2024, .pdf):
https://exploitreversing.files.wordpress.com/2024/01/exploit_reversing_02.pdf
Here you will find various Documents on many different aspects of Windows Internals, Source Level Documentation and General References
Link
#windows
#internals
@islemolecule_source
Link
#windows
#internals
@islemolecule_source
empyreal96.github.io
Home
Windows security operation bypass (AMSI Bypass and Testing Credential Guard)
Link
#windows
#internals
@islemolecule_source
Link
#windows
#internals
@islemolecule_source
a repo to help researchers track Telegram-based C2 comms used by malware authors
credit : @Kostastsale
Check it out: https://github.com/tsale/TeleTracker
Features:
- Send messages to the channel
- Delete all messages from the channel
- Collect info from bot channels and the usernames behind them
- Monitor for new messages to the channel by other bots or users
- Spam the channel with a specific message
#c2
———
@islemolecule_source
credit : @Kostastsale
Check it out: https://github.com/tsale/TeleTracker
Features:
- Send messages to the channel
- Delete all messages from the channel
- Collect info from bot channels and the usernames behind them
- Monitor for new messages to the channel by other bots or users
- Spam the channel with a specific message
#c2
———
@islemolecule_source
David Bombal's recent podcast guest was Mr. Stephen Sims and had a great conversation about how to make money and grow in cyber security. Considering that he is an author, he has presented in conferences , he is a lecturer and he is also active in the field of exploit development, good points can be taken from his words.
To generate income, mention these three points:
- Contrary
- Bug Bounty (Web, but mainly talking about binary exploits)
- Providing professional services such as consulting and penetration testing
Also, some tips to get from point 0 to a good place.
Link
I steal it from @onhex_ir 😁
@islemolecule_source
To generate income, mention these three points:
- Contrary
- Bug Bounty (Web, but mainly talking about binary exploits)
- Providing professional services such as consulting and penetration testing
Also, some tips to get from point 0 to a good place.
Link
@islemolecule_source
Kapellas_mte1604.pdf
1.4 MB
Kapellas_mte1604.pdf
A Thesis in Malware Development
Antonios Kapellas
#malware_dev
@islemolecule_source
A Thesis in Malware Development
Antonios Kapellas
#malware_dev
@islemolecule_source