Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
pestudio-pro-v9.26.rar
951.3 KB
Game hacking allows you to add functionality and change how games work. Whether your goal is to add a new unit to an RTS game or create an aimbot for a FPS game, Game Hacking Academy has lessons to learn along with

https://gamehacking.academy/
Reverse engineering any game using ida

https://youtu.be/o2X4fDbfSXA?si=ZjiCut7wSumsAWT_
😁1
Understanding pointers in reverse engineering

Link
Reverse engineering ctf - synack X HTB

Link
X64 linux binary exploitation


Link
Malquarium - Modern Malware Repository

Link
collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net

Link
Malware Analysis Tools

Link
Introduction to pwn
Link
4
[ 1 ] From a Windows driver to a fully functionnal driver.
In this blogpost we'll go through the history of EDR's, how they used to work, how they work now and how we can build a fully functionnal one. Last step is a chall, bypass MyDumbEDR.

https://sensepost.com/blog/2024/sensecon-23-from-windows-drivers-to-an-almost-fully-working-edr/



[ 2 ] internal mecanisms of EDR's :

https://www.youtube.com/watch?v=yacpjV6kWpM&t=387s


[ 3 ] MyDumbEDR ( written in C )

https://github.com/sensepost/mydumbedr


———
@islemolecule_source
👍2
A basic concept of obfuscating command and control (C2) servers securely with Redirectors.
اطلاعاتی اساسی و مفید در مورد مبهم سازی و محافظت از C2s در مقابل شناسایی شدن, با استفاده از Redirectors.
4
c2_obf.zip
4.2 MB
3
Creating hidden registry key using NtSetValueKey and by adding a null byte in front of the UNICODE_STRING key valuename.
👍2
files.rar
6.1 MB
👍2
مجموعه مقاله/کتاب/ اشنایی با باگ سرریز بافر و نحوه اکسپلویت کردن ان به زبان فارسی 👇👇
👍3
BOFArchive.zip
2.3 MB
👍3
buffer overflow Mhtod.zip
2.7 MB
👍3