Quick Assembler source code released
Simple (experimental) x86/x86 assembler and emulator.
https://github.com/zodiacon/QuickAsm
#tool
———
@islemolecule_source
Simple (experimental) x86/x86 assembler and emulator.
https://github.com/zodiacon/QuickAsm
#tool
———
@islemolecule_source
👍1
Win2K3.z01
1 GB
Windows xp / server 2003 leaked source code
tnx Mr akhzari for uploading on telegram
———
@islemolecule_source
tnx Mr akhzari for uploading on telegram
———
@islemolecule_source
🗿10🔥2
JAVA-Based Sophisticated Stealer Using Discord Bot as EventListener
Link
#malware_analysis
———
@islemolecule_source
Link
#malware_analysis
———
@islemolecule_source
👍3
👍3
👍2
👍3
An Introduction to Deep File Inspection® (DFI)
inquest.net/blog/an-introduc…
#CVE ,
———
@islemolecule_source
inquest.net/blog/an-introduc…
#CVE ,
———
@islemolecule_source
🤔3
Download data from the internet bypassing the firewall using process injection
https://github.com/redeflesq/firewall-bypass
#tool
———
@islemolecule_source
https://github.com/redeflesq/firewall-bypass
#tool
———
@islemolecule_source
👍3
Forwarded from CyberSecurityTechnologies (-CST-)
#Cyber_Education
Writing a Debugger
Part 1 - Attaching to a Process
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-1
Part 2 - Register State and Stepping
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-2
Part 3 - Reading Memory
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-3
Part 4 - Exports and Private Symbols
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-4
Part 5 - Breakpoints
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-5
Part 6 - Stacks
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-6
Writing a Debugger
Part 1 - Attaching to a Process
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-1
Part 2 - Register State and Stepping
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-2
Part 3 - Reading Memory
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-3
Part 4 - Exports and Private Symbols
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-4
Part 5 - Breakpoints
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-5
Part 6 - Stacks
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-6
🔥3👍2
👍2
Forwarded from APT
298559809-27f286d7-e0e3-47ab-864a-e040f8749708.webm
6.5 MB
This vulnerability targets the Common Log File System (CLFS) and allows attackers to escalate privileges and potentially fully compromise an organization’s Windows systems. In April 2023, Microsoft released a patch for this vulnerability and the CNA CVE-2023-28252 was assigned.
📊 Affects version:
— Windows 11 21H2 (clfs.sys version 10.0.22000.1574);
— Windows 11 22H2;
— Windows 10 21H2;
— Windows 10 22H2;
— Windows Server 2022.
Research:
🔗 https://www.coresecurity.com/core-labs/articles/analysis-cve-2023-28252-clfs-vulnerability
Exploit:
🔗 https://github.com/duck-sec/CVE-2023-28252-Compiled-exe
#windows #privesc #clfs #driver
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4
👍2
Buffer Overflow Guide 1.pdf
644.8 KB
Buffer Overflow Guide 1.pdf
👍4