Event Log Tampering .
[ 1 ] Disrupting the EventLog Service
[ 2 ] Manipulating Individual Event Logs
[ 3 ] Combining Techniques
#red_team , #windows_internls
———
@islemolecule_source
[ 1 ] Disrupting the EventLog Service
[ 2 ] Manipulating Individual Event Logs
[ 3 ] Combining Techniques
#red_team , #windows_internls
———
@islemolecule_source
👍1
Introduction_to_Exploit_Zero_Day_Discovery_and_Development_@zer0daylab.zip
1.9 GB
Exploit/Zero-Day Discovery and Development
fuck zeroday lab , message from ana :)
#pwn
———
@islemolecule_source
◽️ Fuzzing
◽️ Buffer Overflow Attacks
◽️ Pivoting From One Compromised Windows Machine To Another Box Using RPivot
◽️ How To Offensively Pass Reverse Shells From A Cloud Server To Your Local Home PC Using SSH Tunneling
◽️ Concealing Your Remote Reconnaissance, Scanning, And Crawling Using Tor-over-VPN
◽️ How To Attack A Corporate Ethernet LAN From A Wi-Fi Hotspot Using Proxy ARP Daemons
◽️ Introduction to Egghunters for situations of limited buffer space
◽️ ROP-Chaining to defeat Data Execution Prevention
◽️ Reverse and Bind Shells
◽️ Post Exploitation
◽️ Exploit Development
◽️ Debugging Crashed Applications
◽️ edb (Evan's Debugger)
◽️ gdb (GNU Debugger)#pwn
———
@islemolecule_source
💩6👍5
🔥2👍1
CVE-2023-42465: SUDO Affected by Stack/Register Flaw, OpenSSH, OpenSSL, and MySQL are Vulnerable
securityonline.info/cve-2023…
#CVE , #analysis
———
@islemolecule_source
securityonline.info/cve-2023…
#CVE , #analysis
———
@islemolecule_source
👍3❤2
CDecomp.pdf
764.4 KB
#reverse
"A Taxonomy of C Decompiler Fidelity Issues", 2023.
https://github.com/huzecong/ghcc
———
@islemolecule_source
"A Taxonomy of C Decompiler Fidelity Issues", 2023.
https://github.com/huzecong/ghcc
———
@islemolecule_source
👍2
👍2
Buffer OverFlow and Buff.HTB Writeup
https://vandanpathak.com/htb-writeups/buffer-overflow-and-buff-htb-writeup/
#pwn
———
@islemolecule_source
https://vandanpathak.com/htb-writeups/buffer-overflow-and-buff-htb-writeup/
#pwn
———
@islemolecule_source
👍2
Reverse engineering, malware analysis, exploits, trainings
link
#pwn
#malware_analysis
#reverse
———
@islemolecule_source
link
#pwn
#malware_analysis
#reverse
———
@islemolecule_source
👍1
About Stack Smashing Protection (it uses Stackguard)
https://embeddedartistry.com/blog/2020/05/18/implementing-stack-smashing-protection-for-microcontrollers-and-embedded-artistrys-libc/
#pwn
https://embeddedartistry.com/blog/2020/05/18/implementing-stack-smashing-protection-for-microcontrollers-and-embedded-artistrys-libc/
#pwn
Embedded Artistry
Implementing Stack Smashing Protection for Microcontrollers (and Embedded Artistry’s libc) - Embedded Artistry
18 May 2020 by Phillip Johnston • Last updated 3 October 2022Stack buffer overflows are a category of error that can wreak havoc on our programs, resulting in sporadic crashes or strange and unexpected program behaviors. A stack buffer overflow occurs when…
👍1
Forwarded from vx-underground
If you're interested in keeping up with ransomware attacks and/or ransomware victims, a group of researchers have ported the vx-underground ransomware news bot over to Telegram
tl;dr monitors ransomware group sites near-in-real-time for latest listings
https://news.1rj.ru/str/RansomwareNewsVX
tl;dr monitors ransomware group sites near-in-real-time for latest listings
https://news.1rj.ru/str/RansomwareNewsVX
Telegram
Ransomware News (VX)
This is NOT the official channel of vx-underground.org /
Another ransom trackers:
https://news.1rj.ru/str/ransomlook
https://news.1rj.ru/str/ransomwarelive
Another ransom trackers:
https://news.1rj.ru/str/ransomlook
https://news.1rj.ru/str/ransomwarelive
👍2
This tool is written for inspecting undebuggable process
https://github.com/daem0nc0re/TangledWinExec/tree/main/ProcMemScan
#reverse
#malware_analysis
———
@islemolecule_source
https://github.com/daem0nc0re/TangledWinExec/tree/main/ProcMemScan
#reverse
#malware_analysis
———
@islemolecule_source
🔥1
I am working on a #red_team course. There are 3 prerequisites. The course is based on mitre tactics and I'm working on the simulations on techniques labs/material.
I am happy to hear your comments
credit : @soheilsec
https://gist.github.com/soheilsec/8310eea7913de6457f0dd89614fd843c
I am happy to hear your comments
credit : @soheilsec
https://gist.github.com/soheilsec/8310eea7913de6457f0dd89614fd843c
👍2🤔2
Source Byte
I am working on a #red_team course. There are 3 prerequisites. The course is based on mitre tactics and I'm working on the simulations on techniques labs/material. I am happy to hear your comments credit : @soheilsec https://gist.github.com/soheilsec/…
This media is not supported in your browser
VIEW IN TELEGRAM
Three parts series on debugging Linux kernel (gdb, kgdb, kgdboc and crash)
Part 1: blogs.oracle.com/linux/post/…
Part 2: blogs.oracle.com/linux/post/…
Part 3: blogs.oracle.com/linux/post/…
#linux , #kernel , #debug ,
Part 1: blogs.oracle.com/linux/post/…
Part 2: blogs.oracle.com/linux/post/…
Part 3: blogs.oracle.com/linux/post/…
#linux , #kernel , #debug ,
Collection of less known features of C programming language by @Jorengarenar
https://blog.joren.ga/less-known-c
https://blog.joren.ga/less-known-c