Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
HyperDbg v0.8 is released!

# [0.8.0.0] - 2024-01-28
New release of the HyperDbg Debugger thanks to @Mattiwatti.

# Changed
- Fix miscalculating MTRRs in 13th gen processors

# Added
- The !mode event command is added to detect kernel-to-user and user-to-kernel transitions
https://docs.hyperdbg.org/commands/extension-commands/mode

- The 'preactivate' command is added to support initializing special functionalities in the Debugger Mode
https://docs.hyperdbg.org/commands/debugging-commands/preactivate

———
@islemolecule_source
👍3🕊21
browser-exploition resources

Link_1

Link_2

Link_3

#browser
#pwn
———
@islemolecule_source
🔥5
chrome-browser-exploitation

Link

#browser
#pwn
———
@islemolecule_source
🔥2
Improving the Landscape and Messaging of Offensive Tooling and Techniques

Part 1
Improving our social media conduct

Part 2
Offensive Tool and Technique Releases


credit : @mattifestation


video :
https://www.youtube.com/watch?v=u00JCQxUAY0

slides :
next post 👇🏻 ( or use this link )

#job_offers , #old_but_gold
———
@islemolecule_source
👍2
Source Byte pinned «browser-exploition resources Link_1 Link_2 Link_3 #browser #pwn ——— @islemolecule_source»
Proof of concept code for thread pool based process injection in Windows.
Link

#malware_dev
———
@islemolecule_source
👍4
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from vx-underground
psiphone android malware samples:) + paper
👍3
vx-underground
Psiphone.rar
WTF ?
you can buy phishing service in iran for only 20-40$ ? 😭💀


we don't have any relation to " source phish " channel they mentioned
🌚5👍2
This write-up will present a case study of using ETW (Event Tracing for Windows) to analyze an active Cobalt Strike Beacon that was still active and communicating to it's C2 Server.

https://github.com/DebugPrivilege/InsightEngineering/tree/main/Debugging 101/Section 8: Introduction to WPT/WPA Review - How to capture ETW trace?


#c2 , #ETW
———
@islemolecule_source
👍3
CS6265: information security lab
Beginning exploitation
Link

#pwn
———
@islemolecule_source
👍2
🔥3👍1
Ai000 Talents - Part 1 NIM Binary Reverse Engineering
Link

#reverse
#malware_analysis
———
@islemolecule_source
👍2
Forwarded from VX-SH
arsenal-kit20240125.tgz
3 MB
Arsenal Kit 20240125

c2e1ba266aa158636ea3470ba6ab7084bb65d6811131c550d8c6357ca0bbaedd


Enjoy !
👍3🌚1
Forwarded from Reverse Dungeon
Залил все выпуски хакера (в том числе спец выпуски)
Со скоростью подгрузки картинок ещё придётся разобраться :)

図書館.きく.コム
👍1
Introduction_to_Exploit_Zero_Day_Discovery_and_Development_@zer0daylab.zip
1.9 GB
Exploit/Zero-Day Discovery and Development

◽️ Fuzzing
◽️ Buffer Overflow Attacks
◽️ Pivoting From One Compromised Windows Machine To Another Box Using RPivot
◽️ How To Offensively Pass Reverse Shells From A Cloud Server To Your Local Home PC Using SSH Tunneling
◽️ Concealing Your Remote Reconnaissance, Scanning, And Crawling Using Tor-over-VPN
◽️ How To Attack A Corporate Ethernet LAN From A Wi-Fi Hotspot Using Proxy ARP Daemons
◽️ Introduction to Egghunters for situations of limited buffer space
◽️ ROP-Chaining to defeat Data Execution Prevention
◽️ Reverse and Bind Shells
◽️ Post Exploitation
◽️ Exploit Development
◽️ Debugging Crashed Applications
◽️ edb (Evan's Debugger)
◽️ gdb (GNU Debugger)


fuck zeroday lab , message from ana :)

#pwn
———
@islemolecule_source
💩6👍5
VOLATILITY CHEATSHEET
link
———
@islemolecule_source
🔥2👍1