Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
👍3
HyperDbg v0.8 is released!

# [0.8.0.0] - 2024-01-28
New release of the HyperDbg Debugger thanks to @Mattiwatti.

# Changed
- Fix miscalculating MTRRs in 13th gen processors

# Added
- The !mode event command is added to detect kernel-to-user and user-to-kernel transitions
https://docs.hyperdbg.org/commands/extension-commands/mode

- The 'preactivate' command is added to support initializing special functionalities in the Debugger Mode
https://docs.hyperdbg.org/commands/debugging-commands/preactivate

———
@islemolecule_source
👍3🕊21
browser-exploition resources

Link_1

Link_2

Link_3

#browser
#pwn
———
@islemolecule_source
🔥5
chrome-browser-exploitation

Link

#browser
#pwn
———
@islemolecule_source
🔥2
Improving the Landscape and Messaging of Offensive Tooling and Techniques

Part 1
Improving our social media conduct

Part 2
Offensive Tool and Technique Releases


credit : @mattifestation


video :
https://www.youtube.com/watch?v=u00JCQxUAY0

slides :
next post 👇🏻 ( or use this link )

#job_offers , #old_but_gold
———
@islemolecule_source
👍2
Source Byte pinned «browser-exploition resources Link_1 Link_2 Link_3 #browser #pwn ——— @islemolecule_source»
Proof of concept code for thread pool based process injection in Windows.
Link

#malware_dev
———
@islemolecule_source
👍4
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from vx-underground
psiphone android malware samples:) + paper
👍3
vx-underground
Psiphone.rar
WTF ?
you can buy phishing service in iran for only 20-40$ ? 😭💀


we don't have any relation to " source phish " channel they mentioned
🌚5👍2
This write-up will present a case study of using ETW (Event Tracing for Windows) to analyze an active Cobalt Strike Beacon that was still active and communicating to it's C2 Server.

https://github.com/DebugPrivilege/InsightEngineering/tree/main/Debugging 101/Section 8: Introduction to WPT/WPA Review - How to capture ETW trace?


#c2 , #ETW
———
@islemolecule_source
👍3
CS6265: information security lab
Beginning exploitation
Link

#pwn
———
@islemolecule_source
👍2
🔥3👍1
Ai000 Talents - Part 1 NIM Binary Reverse Engineering
Link

#reverse
#malware_analysis
———
@islemolecule_source
👍2
Forwarded from VX-SH
arsenal-kit20240125.tgz
3 MB
Arsenal Kit 20240125

c2e1ba266aa158636ea3470ba6ab7084bb65d6811131c550d8c6357ca0bbaedd


Enjoy !
👍3🌚1
Forwarded from Reverse Dungeon
Залил все выпуски хакера (в том числе спец выпуски)
Со скоростью подгрузки картинок ещё придётся разобраться :)

図書館.きく.コム
👍1