Source Byte – Telegram
Source Byte
7.76K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
https://github.com/semgrep/semgrep
———
@islemolecule_source
👎3👍2
Bypass firewall through process injection

https://github.com/redeflesq/firewall-bypass

#malware_dev
———
@islemolecule_source
👍2
What do you know about PE Relocations?!
Link

#malware_analysis
———
@islemolecule_source
👍2
Forwarded from BugCod3
👻 Ghost 👻

👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware

💬
ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the client/zombie noticing. The server/attacker is also given the ability to download and execute files on the client/zombie's computer. This is also a silent and hidden process. Like most Remote Access Trojans, this download and execution ability helps distribute viruses and other pieces of malware.

👁‍🗨
This malware is distributed simply by running zombie.exe. This file name can be changed to whatever. There is no restriction. When run, it searches for the first two arguments (IP & Port). If neither is provided, the program doesn't run. With that being said, make sure you provide the server's IP and Port in the command-line arguments. Example:
zombie.exe 127.0.0.1 27015



📊 Features:
⚪️ Remote command execution
⚪️ Silent background process
⚪️ Download and run file (Hidden)
⚪️ Safe Mode startup
⚪️ Will automatically connect to the server
⚪️ Data sent and received is encrypted (substitution cipher)
⚪️ Files are hidden
⚪️ Installed Antivirus shown to server
⚪️ Easily spread malware through download feature
⚪️ Startup info doesn't show in msconfig or other startup checking programs like CCleaner
⚪️ Disable Task Manager

😸 Github

⬇️ Download
🔒 BugCod3

#Rat #Malware #Remote #Access

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
👌2👍1
👍1
Quick Assembler source code released

Simple (experimental) x86/x86 assembler and emulator.


https://github.com/zodiacon/QuickAsm


#tool
———
@islemolecule_source
👍1
Literally me 👀

I use arch btw 😁
👍4
Win2K3.z01
1 GB
Windows xp / server 2003 leaked source code

tnx Mr akhzari for uploading on telegram
———
@islemolecule_source
🗿10🔥2
JAVA-Based Sophisticated Stealer Using Discord Bot as EventListener
Link

#malware_analysis
———
@islemolecule_source
👍3
Malware development roadmap 2024
Link

#malware_dev
———
@islemolecule_source
👍3
Password Stealers (chrome)
Link

#malware_dev
———
@islemolecule_source
👍2
A Collection of Pure Malware Development Resources.
Link


#malware_dev
———
@islemolecule_source
👍3
An Introduction to Deep File Inspection® (DFI)

inquest.net/blog/an-introduc…

#CVE ,
———
@islemolecule_source
🤔3
Download data from the internet bypassing the firewall using process injection

https://github.com/redeflesq/firewall-bypass


#tool
———
@islemolecule_source
👍3
Forwarded from CyberSecurityTechnologies (-CST-)
🔥3👍2
Browser Security Handbook
Link

#browser
———
@islemolecule_source
👍2
Forwarded from APT
298559809-27f286d7-e0e3-47ab-864a-e040f8749708.webm
6.5 MB
👩‍💻 Windows CLFS Driver Privilege Escalation

This vulnerability targets the Common Log File System (CLFS) and allows attackers to escalate privileges and potentially fully compromise an organization’s Windows systems. In April 2023, Microsoft released a patch for this vulnerability and the CNA CVE-2023-28252 was assigned.

📊 Affects version:
— Windows 11 21H2 (clfs.sys version 10.0.22000.1574);
— Windows 11 22H2;
— Windows 10 21H2;
— Windows 10 22H2;
— Windows Server 2022.

Research:
🔗 https://www.coresecurity.com/core-labs/articles/analysis-cve-2023-28252-clfs-vulnerability

Exploit:
🔗 https://github.com/duck-sec/CVE-2023-28252-Compiled-exe

#windows #privesc #clfs #driver
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4
Buffer Overflow Attacks.pdf
5.4 MB
👍3