Source Byte – Telegram
Source Byte
7.76K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Potential Sliver C2's (239 C2's)
credit : @embee_research

Simple query - based on "operators" and "multiplayer" certificate values related to Sliver Team Servers.

https://search.censys.io/search?

Gist - 43 IP's with 0 VT
LINK

Gist - All 239 IP's
LINK
[Infographic] High-level diagram showcasing Microsoft Defender for Cloud’s
https://raw.githubusercontent.com/JadKaraki/M365ZeroTrust/main/Defender%20for%20Cloud%20Diagram.jpg

Credit: Jad Karaki

#windows_defender
———
@islemolecule_source
OSINTBuddy - The Open-Source Alternative to Maltego ! Node graphs, OSINT data mining, and plugins. Connect unstructured and public data for transformative insights.

https://github.com/jerlendds/osintbuddy
Forwarded from Cracking | Reversing
PeStudio_Pro_9.56.7z
821 KB
Private: @CrackCloudRobot
Crypto Wares: @CryptoWares
Powered by @MalwareForum
1
ER_01.pdf
4.1 MB
#reversing
"Exploiting Reversing (ER) series: Article 01", rev.A, April 2023.

]-> ER: article 02 (2024, .pdf):
https://exploitreversing.files.wordpress.com/2024/01/exploit_reversing_02.pdf
Here you will find various Documents on many different aspects of Windows Internals, Source Level Documentation and General References

Link

#windows
#internals

@islemolecule_source
Windows security operation bypass (AMSI Bypass and Testing Credential Guard)

Link

#windows
#internals

@islemolecule_source
a repo to help researchers track Telegram-based C2 comms used by malware authors
credit : @Kostastsale

Check it out: https://github.com/tsale/TeleTracker

Features:
- Send messages to the channel
- Delete all messages from the channel
- Collect info from bot channels and the usernames behind them
- Monitor for new messages to the channel by other bots or users
- Spam the channel with a specific message

#c2
———
@islemolecule_source
David Bombal's recent podcast guest was Mr. Stephen Sims and had a great conversation about how to make money and grow in cyber security. Considering that he is an author, he has presented in conferences , he is a lecturer and he is also active in the field of exploit development, good points can be taken from his words.

To generate income, mention these three points:
- Contrary
- Bug Bounty (Web, but mainly talking about binary exploits)
- Providing professional services such as consulting and penetration testing

Also, some tips to get from point 0 to a good place.
Link


I steal it from @onhex_ir 😁

@islemolecule_source
Kapellas_mte1604.pdf
1.4 MB
Kapellas_mte1604.pdf

A Thesis in Malware Development
Antonios Kapellas

#malware_dev
@islemolecule_source
Malware Development: Writing a C++ dropper

Link

#malware_dev
@islemolecule_source
Notes on The Art of Malware Development

Link

#malware_dev
@islemolecule_source
About
Framework for building Windows malware, written in C++
Link

#malware_dev
@islemolecule_source
Fundamentals of Malware Development

Link

#malware_dev
@islemolecule_source
Pentester notebook:Malware Development
Link

#malware_dev
@islemolecule_source
Malware Development for Dummies

Link

#malware_dev
@islemolecule_source