Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Intel Hardware Shield deep dive: part 1 is user-mode System Management Mode (ISRD).

https://tandasat.github.io/blog/2024/02/29/ISRD.html
3👍1🔥1
2🔥1
ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs

https://arxiv.org/abs/2402.11753
🔥2
🔥4
🔥1
🔥2👍1
😁8🌚3👌1
CryptoCrime_Rep_2024.pdf
20.8 MB
#book
"The 2024 Crypto Crime Report:
The latest trends in ransomware, scams, hacking and more", Feb. 2024.
🔥5
Advanced CyberChef Techniques for Configuration Extraction - Detailed Walkthrough and Examples

https://embee-research.ghost.io/advanced-cyberchef-operations-netsupport/
🔥5
Data Scientists Targeted by Malicious Hugging Face ML Models with Silent Backdoor

https://jfrog.com/blog/data-scientists-targeted-by-malicious-hugging-face-ml-models-with-silent-backdoor/
🔥4👍2
Forwarded from Pouyan Zamani
Antivirus hackers handbook.pdf
5.6 MB
👏5
👍3
2023 Top Vulnerabilities

CVE-2023-28252 1– Windows Common Log File System Driver Elevation of Privilege Vulnerability.

CVE-2023-7024– Google Chromium WebRTC Heap Buffer Overflow Vulnerability.

CVE-2023-23397 2– Microsoft Outlook Elevation of Privilege Vulnerability.

CVE-2023-34362– Progress MOVEit Transfer SQL Injection Vulnerability.

CVE-2023-38831– RARLAB WinRAR Code Execution Vulnerability

CVE-2023-21674– Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability.

CVE-2023-23376– Windows Common Log File System Driver Elevation of Privilege Vulnerability.

CVE-2023-32434– Apple Multiple Products Integer Overflow Vulnerability.

CVE-2023-41763– Skype for Business Elevation of Privilege Vulnerability.

CVE-2023-36033– Windows DWM Core Library Elevation of Privilege Vulnerability


https://malware.news/t/2023-top-vulnerabilities/79315
🏆3👍2
1
2
How we applied advanced fuzzing techniques to cURL


https://blog.trailofbits.com/2024/03/01/toward-more-effective-curl-fuzzing/
🔥1
Lazarus exploited a flaw in the Windows AppLocker driver (appid.sys) as a zero-day to gain kernel-level access and turn off security tools.CVE-2024-21338
Beyond BYOVD with an Admin-to-Kernel Zero-Day
https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/
Blue Team Level 1 2022 GREENARMOR (1).rar
1 GB
Password : GREENARMOR

Thanks " ./h4x Forensics " and others for sharing
1