Understanding Windows x64 Assembly
credit : @therealdreg
https://sonictk.github.io/asm_tutorial/
#windows_internls , #assembly ,
———
@islemolecule_source
credit : @therealdreg
https://sonictk.github.io/asm_tutorial/
#windows_internls , #assembly ,
———
@islemolecule_source
👍2👌2
👍3
Recreate undocumented structure using local types in ida pro
Link
#reverse
#malware_analysis
———
@islemolecule_source
Link
#reverse
#malware_analysis
———
@islemolecule_source
YouTube
Recreating Undocumented Structures Using Local Types in IDA Pro
MOST VIDEOS ARE UNDER THE LIVE SECTION!
In this video we look at how to recreate an undocumented structure that we've identified in a Microsoft Library. Specifically, in a prior video:
https://www.youtube.com/live/xFglo9w_dVQ?si=TXQWREqyRsii9j6s
...we…
In this video we look at how to recreate an undocumented structure that we've identified in a Microsoft Library. Specifically, in a prior video:
https://www.youtube.com/live/xFglo9w_dVQ?si=TXQWREqyRsii9j6s
...we…
👍4
HyperDbg v0.8 is released!
# [0.8.0.0] - 2024-01-28
New release of the HyperDbg Debugger thanks to @Mattiwatti.
# Changed
- Fix miscalculating MTRRs in 13th gen processors
# Added
- The !mode event command is added to detect kernel-to-user and user-to-kernel transitions
https://docs.hyperdbg.org/commands/extension-commands/mode
- The 'preactivate' command is added to support initializing special functionalities in the Debugger Mode
https://docs.hyperdbg.org/commands/debugging-commands/preactivate
———
@islemolecule_source
# [0.8.0.0] - 2024-01-28
New release of the HyperDbg Debugger thanks to @Mattiwatti.
# Changed
- Fix miscalculating MTRRs in 13th gen processors
# Added
- The !mode event command is added to detect kernel-to-user and user-to-kernel transitions
https://docs.hyperdbg.org/commands/extension-commands/mode
- The 'preactivate' command is added to support initializing special functionalities in the Debugger Mode
https://docs.hyperdbg.org/commands/debugging-commands/preactivate
———
@islemolecule_source
👍3🕊2❤1
🔥5
🔥2
Improving the Landscape and Messaging of Offensive Tooling and Techniques
Part 1
Improving our social media conduct
Part 2
Offensive Tool and Technique Releases
credit : @mattifestation
video :
https://www.youtube.com/watch?v=u00JCQxUAY0
slides :
next post 👇🏻( or use this link )
#job_offers , #old_but_gold
———
@islemolecule_source
Part 1
Improving our social media conduct
Part 2
Offensive Tool and Technique Releases
credit : @mattifestation
video :
https://www.youtube.com/watch?v=u00JCQxUAY0
slides :
next post 👇🏻
#job_offers , #old_but_gold
———
@islemolecule_source
👍2
Source Byte pinned «browser-exploition resources Link_1 Link_2 Link_3 #browser #pwn ——— @islemolecule_source»
Proof of concept code for thread pool based process injection in Windows.
Link
#malware_dev
———
@islemolecule_source
Link
#malware_dev
———
@islemolecule_source
👍4
Forwarded from vx-underground
👍3
vx-underground
Psiphone.rar
WTF ?
you can buy phishing service in iran for only 20-40$ ? 😭💀
we don't have any relation to " source phish " channel they mentioned
you can buy phishing service in iran for only 20-40$ ? 😭💀
🌚5👍2
This write-up will present a case study of using ETW (Event Tracing for Windows) to analyze an active Cobalt Strike Beacon that was still active and communicating to it's C2 Server.
https://github.com/DebugPrivilege/InsightEngineering/tree/main/Debugging 101/Section 8: Introduction to WPT/WPA Review - How to capture ETW trace?
#c2 , #ETW
———
@islemolecule_source
https://github.com/DebugPrivilege/InsightEngineering/tree/main/Debugging 101/Section 8: Introduction to WPT/WPA Review - How to capture ETW trace?
#c2 , #ETW
———
@islemolecule_source
👍3
👍2
Understanding WebAssembly text format
https://developer.mozilla.org/en-US/docs/WebAssembly/Understanding_the_text_format
#webassembly
———
@islemolecule_source
https://developer.mozilla.org/en-US/docs/WebAssembly/Understanding_the_text_format
#webassembly
———
@islemolecule_source
🔥3👍1
Ai000 Talents - Part 1 NIM Binary Reverse Engineering
Link
#reverse
#malware_analysis
———
@islemolecule_source
Link
#reverse
#malware_analysis
———
@islemolecule_source
👍2
Forwarded from VX-SH
arsenal-kit20240125.tgz
3 MB
Arsenal Kit 20240125
Enjoy !
c2e1ba266aa158636ea3470ba6ab7084bb65d6811131c550d8c6357ca0bbaedd
Enjoy !
👍3🌚1