Buffer Overflow Guide 1.pdf
644.8 KB
Buffer Overflow Guide 1.pdf
👍4
Source Byte
Linux Internals and Forensics.pdf
Mr. Kazemi is one of the best teachers in Iran got into problem with an organization for his Linux Internals and Linux Forensics course and that organization did not pay for the course.
So the course is published for free by Mr. Kazemi to be reviewed by the public.
This course has high quality because it was created for an important organization.
slides 👆🏻
language : persian
course materials : https://news.1rj.ru/str/source_chat/3075 / https://news.1rj.ru/str/akazemi67_courses/23
So the course is published for free by Mr. Kazemi to be reviewed by the public.
This course has high quality because it was created for an important organization.
slides 👆🏻
language : persian
course materials : https://news.1rj.ru/str/source_chat/3075 / https://news.1rj.ru/str/akazemi67_courses/23
Telegram
Source Byte in Source Chat
❤9👍3
👍2
stack-overflow.pdf
1.6 MB
stack-overflow.pdf
qses-08-buffer-overflows_part2.pdf
1.8 MB
qses-08-buffer-overflows_part2.pdf
356lecture21.pdf
3.3 MB
356lecture21.pdf
Lecture21.pdf
441.9 KB
Lecture21.pdf
👍1
This is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Directory Web Services (#ADWS) protocol.
https://github.com/FalconForceTeam/SOAPHound
blog
https://github.com/FalconForceTeam/SOAPHound
blog
👍2
Abuse_public_PEF.pdf
2.6 MB
Threat Intelligence of
Abused Public Post-Exploitation Frameworks
credit : https://jsac.jpcert.or.jp/index.html
Abused Public Post-Exploitation Frameworks
credit : https://jsac.jpcert.or.jp/index.html
❤2👍2
Analyzing Modern Malware Techniques series
[ 1 ] Fileless Malware - A self loading technique
[ 2 ] A case of Powershell, Excel 4 Macros and VB6 (part 1 of 2)
[ 3 ] A case of Powershell, Excel 4 Macros and VB6 (part 2 of 2)
[ 4 ] I’m afraid of no packer
#old_but_gold
———
@islemolecule_source
[ 1 ] Fileless Malware - A self loading technique
[ 2 ] A case of Powershell, Excel 4 Macros and VB6 (part 1 of 2)
[ 3 ] A case of Powershell, Excel 4 Macros and VB6 (part 2 of 2)
[ 4 ] I’m afraid of no packer
#old_but_gold
———
@islemolecule_source
👍2
Living Off The Land Binaries, Scripts and Libraries
Windows binary used for handling certificates
🔗
https://lolbas-project.github.io/lolbas/Binaries/Certutil/
#malware_dev , #LoLBins
———
@islemolecule_source
Windows binary used for handling certificates
🔗
https://lolbas-project.github.io/lolbas/Binaries/Certutil/
#malware_dev , #LoLBins
———
@islemolecule_source
👍2
What are LOLBins and How Can They be Used Maliciously?
https://www.securityhq.com/blog/security-101-lolbins-malware-exploitation/
#malware_dev , #LoLBins , #CA
———
@islemolecule_source
https://www.securityhq.com/blog/security-101-lolbins-malware-exploitation/
#malware_dev , #LoLBins , #CA
———
@islemolecule_source
👍2
Leaks and Revelations: A Web of IRGC Networks and Cyber Companies
https://www.recordedfuture.com/leaks-and-revelations-irgc-networks-cyber-companies
https://www.recordedfuture.com/leaks-and-revelations-irgc-networks-cyber-companies
👍2