Malware Analysis Tutorials: a Reverse Engineering Approach
Author: Dr. Xiang Fu
(One of the best)
Link
#malware_analysis
———
@islemolecule_source
Author: Dr. Xiang Fu
(One of the best)
Link
#malware_analysis
———
@islemolecule_source
Blogspot
Malware Analysis Tutorials: a Reverse Engineering Approach
Author: Dr. Xiang Fu Roadmap: You need to first follow Tutorials 1 to 4 to set up the lab configuration. Then each tutorial addresses an ...
Forwarded from CRACKSurl
VMware.ESXi.v8.0.2-BTCRiSO.rar
766.3 KB
VMware All Products Multi Keygen Win-Linux-OSX by BTCRiSO
My friend explain and show how to work with gdb + demo
https://www.aparat.com/v/zdEBg
(Persian)
#reverse
———
@islemolecule_source
https://www.aparat.com/v/zdEBg
(Persian)
#reverse
———
@islemolecule_source
آپارات - سرویس اشتراک ویدیو
بررسی و نحوه کار با دیباگر GDB لینوکس
GDB چیست ؟GNU Debugger ابزاری است که امکاناتی در اختیار شما قرار می دهد تا بتوانید ببینید درون برنامه تان چه اتفاقی میفتد یا در حین ایجاد یک مشکل در کدتان، کد چگونه عکس العمل نشان می دهد. GDB از طریق متوقف کردن برنامه در لحظات مشخص و همچنین شروع برنامه از…
❤5💩1
Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1
https://securityintelligence.com/x-force/analysis-rce-vulnerability-cobalt-strike/
———
@islemolecule_source
https://securityintelligence.com/x-force/analysis-rce-vulnerability-cobalt-strike/
———
@islemolecule_source
🔥4
Forwarded from Offensive Xwitter
😈 [ Soumyani1 @reveng007 ]
I wanna thank all of them (Not In Order):
@SEKTOR7net
@VirtualAllocEx
@peterwintrsmith
@D1rkMtr
@Jean_Maes_1994
@0xBoku
@Sh0ckFR
@_winterknife_
@jack_halon
For helping me develop this POC, DarkWidow:
🔗 https://github.com/reveng007/DarkWidow
🐥 [ tweet ]
I wanna thank all of them (Not In Order):
@SEKTOR7net
@VirtualAllocEx
@peterwintrsmith
@D1rkMtr
@Jean_Maes_1994
@0xBoku
@Sh0ckFR
@_winterknife_
@jack_halon
For helping me develop this POC, DarkWidow:
🔗 https://github.com/reveng007/DarkWidow
🐥 [ tweet ]
👍4
how to create a thread pool using solely native Windows APIs to execute a work callback as well as a timer callback in C.
Link
#malware_dev
———
@islemolecule_source
Link
#malware_dev
———
@islemolecule_source
❤4
An experimental, in-development, malicious software with RCE, and Data Exfiltration capabilities as a core.
Link
#malware_dev
———
@islemolecule_source
Link
#malware_dev
———
@islemolecule_source
👍4🔥1
👍4
Windows Process Internals : A few Concepts to know before jumping on Memory Forensics
credit : Kirtar Oza
https://web.archive.org/web/20201117183039/https://eforensicsmag.com/windows-process-internals-a-few-concepts-to-know-before-jumping-on-memory-forensics-by-kirtar-oza/
#windows_internls . #memory_forensics
———
@islemolecule_source
credit : Kirtar Oza
https://web.archive.org/web/20201117183039/https://eforensicsmag.com/windows-process-internals-a-few-concepts-to-know-before-jumping-on-memory-forensics-by-kirtar-oza/
#windows_internls . #memory_forensics
———
@islemolecule_source
👍3
🤩2❤1
Red team road map
Intern / junior / medium / senior
Red team needed concepts
Credit : Sohiel Hashemi
https://xmind.app/m/9Zcnkq
#red_team ,
———
@islemolecule_source
Intern / junior / medium / senior
Red team needed concepts
Credit : Sohiel Hashemi
https://xmind.app/m/9Zcnkq
#red_team ,
———
@islemolecule_source
😁6🎃4❤1👍1
Coyote: A multi-stage banking Trojan abusing the Squirrel installer
Link
#malware_analysis
———
@islemolecule_source
Link
#malware_analysis
———
@islemolecule_source
👍8