Forwarded from BugCod3
ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the client/zombie noticing. The server/attacker is also given the ability to download and execute files on the client/zombie's computer. This is also a silent and hidden process. Like most Remote Access Trojans, this download and execution ability helps distribute viruses and other pieces of malware.
This malware is distributed simply by running zombie.exe. This file name can be changed to whatever. There is no restriction. When run, it searches for the first two arguments (IP & Port). If neither is provided, the program doesn't run. With that being said, make sure you provide the server's IP and Port in the command-line arguments. Example:
zombie.exe 127.0.0.1 27015
BugCod3#Rat #Malware #Remote #Access
Please open Telegram to view this post
VIEW IN TELEGRAM
👌2👍1
Stack Canaries – By sans
https://www.sans.org/blog/stack-canaries-gingerly-sidestepping-the-cage/
#windows
———
@islemolecule_source
https://www.sans.org/blog/stack-canaries-gingerly-sidestepping-the-cage/
#windows
———
@islemolecule_source
👍1
Quick Assembler source code released
Simple (experimental) x86/x86 assembler and emulator.
https://github.com/zodiacon/QuickAsm
#tool
———
@islemolecule_source
Simple (experimental) x86/x86 assembler and emulator.
https://github.com/zodiacon/QuickAsm
#tool
———
@islemolecule_source
👍1
Win2K3.z01
1 GB
Windows xp / server 2003 leaked source code
tnx Mr akhzari for uploading on telegram
———
@islemolecule_source
tnx Mr akhzari for uploading on telegram
———
@islemolecule_source
🗿10🔥2
JAVA-Based Sophisticated Stealer Using Discord Bot as EventListener
Link
#malware_analysis
———
@islemolecule_source
Link
#malware_analysis
———
@islemolecule_source
👍3
👍3
👍2
👍3
An Introduction to Deep File Inspection® (DFI)
inquest.net/blog/an-introduc…
#CVE ,
———
@islemolecule_source
inquest.net/blog/an-introduc…
#CVE ,
———
@islemolecule_source
🤔3
Download data from the internet bypassing the firewall using process injection
https://github.com/redeflesq/firewall-bypass
#tool
———
@islemolecule_source
https://github.com/redeflesq/firewall-bypass
#tool
———
@islemolecule_source
👍3
Forwarded from CyberSecurityTechnologies (-CST-)
#Cyber_Education
Writing a Debugger
Part 1 - Attaching to a Process
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-1
Part 2 - Register State and Stepping
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-2
Part 3 - Reading Memory
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-3
Part 4 - Exports and Private Symbols
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-4
Part 5 - Breakpoints
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-5
Part 6 - Stacks
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-6
Writing a Debugger
Part 1 - Attaching to a Process
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-1
Part 2 - Register State and Stepping
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-2
Part 3 - Reading Memory
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-3
Part 4 - Exports and Private Symbols
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-4
Part 5 - Breakpoints
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-5
Part 6 - Stacks
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-6
🔥3👍2
👍2
Forwarded from APT
298559809-27f286d7-e0e3-47ab-864a-e040f8749708.webm
6.5 MB
This vulnerability targets the Common Log File System (CLFS) and allows attackers to escalate privileges and potentially fully compromise an organization’s Windows systems. In April 2023, Microsoft released a patch for this vulnerability and the CNA CVE-2023-28252 was assigned.
📊 Affects version:
— Windows 11 21H2 (clfs.sys version 10.0.22000.1574);
— Windows 11 22H2;
— Windows 10 21H2;
— Windows 10 22H2;
— Windows Server 2022.
Research:
🔗 https://www.coresecurity.com/core-labs/articles/analysis-cve-2023-28252-clfs-vulnerability
Exploit:
🔗 https://github.com/duck-sec/CVE-2023-28252-Compiled-exe
#windows #privesc #clfs #driver
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4
👍2
Buffer Overflow Guide 1.pdf
644.8 KB
Buffer Overflow Guide 1.pdf
👍4