OSINTBuddy - The Open-Source Alternative to Maltego ! Node graphs, OSINT data mining, and plugins. Connect unstructured and public data for transformative insights.
https://github.com/jerlendds/osintbuddy
https://github.com/jerlendds/osintbuddy
ER_01.pdf
4.1 MB
#reversing
"Exploiting Reversing (ER) series: Article 01", rev.A, April 2023.
]-> ER: article 02 (2024, .pdf):
https://exploitreversing.files.wordpress.com/2024/01/exploit_reversing_02.pdf
"Exploiting Reversing (ER) series: Article 01", rev.A, April 2023.
]-> ER: article 02 (2024, .pdf):
https://exploitreversing.files.wordpress.com/2024/01/exploit_reversing_02.pdf
Here you will find various Documents on many different aspects of Windows Internals, Source Level Documentation and General References
Link
#windows
#internals
@islemolecule_source
Link
#windows
#internals
@islemolecule_source
empyreal96.github.io
Home
Windows security operation bypass (AMSI Bypass and Testing Credential Guard)
Link
#windows
#internals
@islemolecule_source
Link
#windows
#internals
@islemolecule_source
a repo to help researchers track Telegram-based C2 comms used by malware authors
credit : @Kostastsale
Check it out: https://github.com/tsale/TeleTracker
Features:
- Send messages to the channel
- Delete all messages from the channel
- Collect info from bot channels and the usernames behind them
- Monitor for new messages to the channel by other bots or users
- Spam the channel with a specific message
#c2
———
@islemolecule_source
credit : @Kostastsale
Check it out: https://github.com/tsale/TeleTracker
Features:
- Send messages to the channel
- Delete all messages from the channel
- Collect info from bot channels and the usernames behind them
- Monitor for new messages to the channel by other bots or users
- Spam the channel with a specific message
#c2
———
@islemolecule_source
David Bombal's recent podcast guest was Mr. Stephen Sims and had a great conversation about how to make money and grow in cyber security. Considering that he is an author, he has presented in conferences , he is a lecturer and he is also active in the field of exploit development, good points can be taken from his words.
To generate income, mention these three points:
- Contrary
- Bug Bounty (Web, but mainly talking about binary exploits)
- Providing professional services such as consulting and penetration testing
Also, some tips to get from point 0 to a good place.
Link
I steal it from @onhex_ir 😁
@islemolecule_source
To generate income, mention these three points:
- Contrary
- Bug Bounty (Web, but mainly talking about binary exploits)
- Providing professional services such as consulting and penetration testing
Also, some tips to get from point 0 to a good place.
Link
@islemolecule_source
Kapellas_mte1604.pdf
1.4 MB
Kapellas_mte1604.pdf
A Thesis in Malware Development
Antonios Kapellas
#malware_dev
@islemolecule_source
A Thesis in Malware Development
Antonios Kapellas
#malware_dev
@islemolecule_source
Nim on the Attack: Process Injection Using Nim and the Windows API
Link
#malware_dev
@islemolecule_source
Link
#malware_dev
@islemolecule_source
My programming setup
My complete development and hacking setup.
Link
#malware_dev
———
@islemolecule_source
Link
#malware_dev
———
@islemolecule_source