🔥2
Improving the Landscape and Messaging of Offensive Tooling and Techniques
Part 1
Improving our social media conduct
Part 2
Offensive Tool and Technique Releases
credit : @mattifestation
video :
https://www.youtube.com/watch?v=u00JCQxUAY0
slides :
next post 👇🏻( or use this link )
#job_offers , #old_but_gold
———
@islemolecule_source
Part 1
Improving our social media conduct
Part 2
Offensive Tool and Technique Releases
credit : @mattifestation
video :
https://www.youtube.com/watch?v=u00JCQxUAY0
slides :
next post 👇🏻
#job_offers , #old_but_gold
———
@islemolecule_source
👍2
Source Byte pinned «browser-exploition resources Link_1 Link_2 Link_3 #browser #pwn ——— @islemolecule_source»
Proof of concept code for thread pool based process injection in Windows.
Link
#malware_dev
———
@islemolecule_source
Link
#malware_dev
———
@islemolecule_source
👍4
Forwarded from vx-underground
👍3
vx-underground
Psiphone.rar
WTF ?
you can buy phishing service in iran for only 20-40$ ? 😭💀
we don't have any relation to " source phish " channel they mentioned
you can buy phishing service in iran for only 20-40$ ? 😭💀
🌚5👍2
This write-up will present a case study of using ETW (Event Tracing for Windows) to analyze an active Cobalt Strike Beacon that was still active and communicating to it's C2 Server.
https://github.com/DebugPrivilege/InsightEngineering/tree/main/Debugging 101/Section 8: Introduction to WPT/WPA Review - How to capture ETW trace?
#c2 , #ETW
———
@islemolecule_source
https://github.com/DebugPrivilege/InsightEngineering/tree/main/Debugging 101/Section 8: Introduction to WPT/WPA Review - How to capture ETW trace?
#c2 , #ETW
———
@islemolecule_source
👍3
👍2
Understanding WebAssembly text format
https://developer.mozilla.org/en-US/docs/WebAssembly/Understanding_the_text_format
#webassembly
———
@islemolecule_source
https://developer.mozilla.org/en-US/docs/WebAssembly/Understanding_the_text_format
#webassembly
———
@islemolecule_source
🔥3👍1
Ai000 Talents - Part 1 NIM Binary Reverse Engineering
Link
#reverse
#malware_analysis
———
@islemolecule_source
Link
#reverse
#malware_analysis
———
@islemolecule_source
👍2
Forwarded from VX-SH
arsenal-kit20240125.tgz
3 MB
Arsenal Kit 20240125
Enjoy !
c2e1ba266aa158636ea3470ba6ab7084bb65d6811131c550d8c6357ca0bbaedd
Enjoy !
👍3🌚1
Forwarded from Reverse Dungeon
Залил все выпуски хакера (в том числе спец выпуски)
Со скоростью подгрузки картинок ещё придётся разобраться :)
図書館.きく.コム
Со скоростью подгрузки картинок ещё придётся разобраться :)
図書館.きく.コム
👍1
Event Log Tampering .
[ 1 ] Disrupting the EventLog Service
[ 2 ] Manipulating Individual Event Logs
[ 3 ] Combining Techniques
#red_team , #windows_internls
———
@islemolecule_source
[ 1 ] Disrupting the EventLog Service
[ 2 ] Manipulating Individual Event Logs
[ 3 ] Combining Techniques
#red_team , #windows_internls
———
@islemolecule_source
👍1
Introduction_to_Exploit_Zero_Day_Discovery_and_Development_@zer0daylab.zip
1.9 GB
Exploit/Zero-Day Discovery and Development
fuck zeroday lab , message from ana :)
#pwn
———
@islemolecule_source
◽️ Fuzzing
◽️ Buffer Overflow Attacks
◽️ Pivoting From One Compromised Windows Machine To Another Box Using RPivot
◽️ How To Offensively Pass Reverse Shells From A Cloud Server To Your Local Home PC Using SSH Tunneling
◽️ Concealing Your Remote Reconnaissance, Scanning, And Crawling Using Tor-over-VPN
◽️ How To Attack A Corporate Ethernet LAN From A Wi-Fi Hotspot Using Proxy ARP Daemons
◽️ Introduction to Egghunters for situations of limited buffer space
◽️ ROP-Chaining to defeat Data Execution Prevention
◽️ Reverse and Bind Shells
◽️ Post Exploitation
◽️ Exploit Development
◽️ Debugging Crashed Applications
◽️ edb (Evan's Debugger)
◽️ gdb (GNU Debugger)#pwn
———
@islemolecule_source
💩6👍5
🔥2👍1
CVE-2023-42465: SUDO Affected by Stack/Register Flaw, OpenSSH, OpenSSL, and MySQL are Vulnerable
securityonline.info/cve-2023…
#CVE , #analysis
———
@islemolecule_source
securityonline.info/cve-2023…
#CVE , #analysis
———
@islemolecule_source
👍3❤2