Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
vx-underground
Psiphone.rar
WTF ?
you can buy phishing service in iran for only 20-40$ ? 😭💀


we don't have any relation to " source phish " channel they mentioned
🌚5👍2
This write-up will present a case study of using ETW (Event Tracing for Windows) to analyze an active Cobalt Strike Beacon that was still active and communicating to it's C2 Server.

https://github.com/DebugPrivilege/InsightEngineering/tree/main/Debugging 101/Section 8: Introduction to WPT/WPA Review - How to capture ETW trace?


#c2 , #ETW
———
@islemolecule_source
👍3
CS6265: information security lab
Beginning exploitation
Link

#pwn
———
@islemolecule_source
👍2
🔥3👍1
Ai000 Talents - Part 1 NIM Binary Reverse Engineering
Link

#reverse
#malware_analysis
———
@islemolecule_source
👍2
Forwarded from VX-SH
arsenal-kit20240125.tgz
3 MB
Arsenal Kit 20240125

c2e1ba266aa158636ea3470ba6ab7084bb65d6811131c550d8c6357ca0bbaedd


Enjoy !
👍3🌚1
Forwarded from Reverse Dungeon
Залил все выпуски хакера (в том числе спец выпуски)
Со скоростью подгрузки картинок ещё придётся разобраться :)

図書館.きく.コム
👍1
Introduction_to_Exploit_Zero_Day_Discovery_and_Development_@zer0daylab.zip
1.9 GB
Exploit/Zero-Day Discovery and Development

◽️ Fuzzing
◽️ Buffer Overflow Attacks
◽️ Pivoting From One Compromised Windows Machine To Another Box Using RPivot
◽️ How To Offensively Pass Reverse Shells From A Cloud Server To Your Local Home PC Using SSH Tunneling
◽️ Concealing Your Remote Reconnaissance, Scanning, And Crawling Using Tor-over-VPN
◽️ How To Attack A Corporate Ethernet LAN From A Wi-Fi Hotspot Using Proxy ARP Daemons
◽️ Introduction to Egghunters for situations of limited buffer space
◽️ ROP-Chaining to defeat Data Execution Prevention
◽️ Reverse and Bind Shells
◽️ Post Exploitation
◽️ Exploit Development
◽️ Debugging Crashed Applications
◽️ edb (Evan's Debugger)
◽️ gdb (GNU Debugger)


fuck zeroday lab , message from ana :)

#pwn
———
@islemolecule_source
💩6👍5
VOLATILITY CHEATSHEET
link
———
@islemolecule_source
🔥2👍1
CVE-2023-42465: SUDO Affected by Stack/Register Flaw, OpenSSH, OpenSSL, and MySQL are Vulnerable

securityonline.info/cve-2023…


#CVE , #analysis
———
@islemolecule_source
👍32
CDecomp.pdf
764.4 KB
#reverse
"A Taxonomy of C Decompiler Fidelity Issues", 2023.

https://github.com/huzecong/ghcc

———
@islemolecule_source
👍2
Heap-based buffer overflow in the glibc's syslog()
Link

———
@islemolecule_source
👍2
👍2
Reverse engineering, malware analysis, exploits, trainings
link


#pwn
#malware_analysis
#reverse

———
@islemolecule_source
👍1
It appears
@Ripple was hacked for ~213M XRP ($112.5M)

Source address
rJNLz3A1qPKfWCtJLPhmMZAfBkutC2Qojm

So far the stolen funds have been laundered through MEXC, Gate, Binance, Kraken, OKX, HTX, HitBTC, etc

credit : @zachxbt
🔥5
IDA Pro 8.3.230608 (x86, x86_64).7z
404.8 MB
Ida pro


Pass: IDA_8.3
#reverse
———
@islemolecule_source
👍4
Forwarded from vx-underground
If you're interested in keeping up with ransomware attacks and/or ransomware victims, a group of researchers have ported the vx-underground ransomware news bot over to Telegram

tl;dr monitors ransomware group sites near-in-real-time for latest listings

https://news.1rj.ru/str/RansomwareNewsVX
👍2