👍2
❤1👍1
👍1🔥1
🔥2👍1
👍1🔥1
HTTP Botnet designed to replicate a full weaponized commercial botnet.
Link
#malware_dev
------------------
@islemolecule_source
Link
#malware_dev
------------------
@islemolecule_source
😁2👍1
🔥2👍1
persistent reverse shell for windows
Link
#windows
#malware_dev
----------------------
@islemolecule_source
Link
#windows
#malware_dev
----------------------
@islemolecule_source
🔥4
Malware and cryptography 24: encrypt/decrypt file via Madryga. Simple C/C++ example.
Link
#malware_dev
----------------------
@islemolecule_source
Link
#malware_dev
----------------------
@islemolecule_source
🔥3👍2
FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Link
#reverse
----------------------
@islemolecule_source
Link
#reverse
----------------------
@islemolecule_source
👍1🔥1
🔥2👍1
List of awesome reverse engineering resources
Link
#reverse
----------------------
@islemolecule_source
Link
#reverse
----------------------
@islemolecule_source
⚡1👍1
🍾2👍1
This repository helps you to acquire knowledge of software engineering by self-reading and using free resources if you did not go to university.
language : persian
https://github.com/kalagar/computer-science-university-alternative?tab=readme-ov-file
language : persian
https://github.com/kalagar/computer-science-university-alternative?tab=readme-ov-file
❤4👍1
a great series for learning Linux kernel exploitation
CVE-2017-11176 (UaF in mq_notify function)
Credit: @LexfoSecurite
[ 1 ] blog.lexfo.fr/cve-2017-11176…
[ 2 ] blog.lexfo.fr/cve-2017-11176…
[ 3 ] blog.lexfo.fr/cve-2017-11176…
[ 4 ] blog.lexfo.fr/cve-2017-11176…
#CVE , #analysis , #old_but_gold
——-
@islemolecule_source
CVE-2017-11176 (UaF in mq_notify function)
Credit: @LexfoSecurite
[ 1 ] blog.lexfo.fr/cve-2017-11176…
[ 2 ] blog.lexfo.fr/cve-2017-11176…
[ 3 ] blog.lexfo.fr/cve-2017-11176…
[ 4 ] blog.lexfo.fr/cve-2017-11176…
#CVE , #analysis , #old_but_gold
——-
@islemolecule_source
👍4
Loading DLLs without LoadLibraryA. Instead we'll leverage the VEH (Vectored Exception Handler) to modify the context, especially RIP and RCX to hold the LoadLibraryA address and it's argument.
Link
#malware_dev
———
@islemolecule_source
Link
#malware_dev
———
@islemolecule_source
🔥3❤1👍1🤡1
🔥3👍1
👍3🔥1
👍3
LOLBin for Downloading Arbitrary Files
Find the downloaded file in
#windows
#redteam
#lolbin
———
@islemolecule_source
C:\Windows\System32\IME\SHARED\IMEWDBLD.exe <URL>Find the downloaded file in
%LocalAppData%\Microsoft\Windows\INetCache\<8_RANDOM_ALNUM_CHARS>/<FILENAME>[1].<EXTENSION>#windows
#redteam
#lolbin
———
@islemolecule_source
👍2🔥2