open source RAT on the scene Xeno Rat
https://www.cyfirma.com/outofband/xeno-rat-a-new-remote-access-trojan-with-advance-capabilities/
https://github.com/moom825/xeno-rat
https://www.cyfirma.com/outofband/xeno-rat-a-new-remote-access-trojan-with-advance-capabilities/
https://github.com/moom825/xeno-rat
❤2
How we applied advanced fuzzing techniques to cURL
https://blog.trailofbits.com/2024/03/01/toward-more-effective-curl-fuzzing/
https://blog.trailofbits.com/2024/03/01/toward-more-effective-curl-fuzzing/
🔥1
Lazarus exploited a flaw in the Windows AppLocker driver (appid.sys) as a zero-day to gain kernel-level access and turn off security tools.CVE-2024-21338
Beyond BYOVD with an Admin-to-Kernel Zero-Day
https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/
Beyond BYOVD with an Admin-to-Kernel Zero-Day
https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/
Blue Team Level 1 2022 GREENARMOR (1).rar
1 GB
Password :
Thanks " ./h4x Forensics " and others for sharing
GREENARMORThanks " ./h4x Forensics " and others for sharing
❤1
Forwarded from Reverse Dungeon
MIT Operating System Engineering 6.1810(6.S081) Course
labs, pdfs, books, links, videos included
https://github.com/yaruwangway/6.S081
https://youtube.com/playlist?list=PLTsf9UeqkReZHXWY9yJvTwLJWYYPcKEqK&si=zt7GV6w5zFD-Vau4
CS 162 Berkley
https://youtube.com/playlist?list=PLF2K2xZjNEf97A_uBCwEl61sdxWVP7VWC&si=iQHM_2XyWPerIW4P
labs, pdfs, books, links, videos included
https://github.com/yaruwangway/6.S081
https://youtube.com/playlist?list=PLTsf9UeqkReZHXWY9yJvTwLJWYYPcKEqK&si=zt7GV6w5zFD-Vau4
CS 162 Berkley
https://youtube.com/playlist?list=PLF2K2xZjNEf97A_uBCwEl61sdxWVP7VWC&si=iQHM_2XyWPerIW4P
GitHub
GitHub - yaruwangway/6.S081: 🎶 MIT 6.S081 Operating System Engineering
🎶 MIT 6.S081 Operating System Engineering. Contribute to yaruwangway/6.S081 development by creating an account on GitHub.
Forwarded from Reverse Dungeon
Reverse Dungeon
MIT Operating System Engineering 6.1810(6.S081) Course labs, pdfs, books, links, videos included https://github.com/yaruwangway/6.S081 https://youtube.com/playlist?list=PLTsf9UeqkReZHXWY9yJvTwLJWYYPcKEqK&si=zt7GV6w5zFD-Vau4 CS 162 Berkley https://youtu…
Несколько переведённых глав из книжки об операционной системе, разбирающейся в курсе:
Глава 6. Блокировки
https://habr.com/ru/articles/789478
Глава 5. Прерывания и драйверы устройств
https://habr.com/ru/articles/791058
Глава 4. Прерывания и системные вызовы
https://habr.com/ru/articles/791286
Глава 3. Таблицы страниц
https://habr.com/ru/articles/792808
Инструменты для сборки и запуска xv6 под QEMU
https://habr.com/ru/articles/794326
Глава 2. Устройство операционной системы
https://habr.com/ru/articles/795735
Глава 1. Интерфейсы операционной системы
https://habr.com/ru/articles/797557
Глава 6. Блокировки
https://habr.com/ru/articles/789478
Глава 5. Прерывания и драйверы устройств
https://habr.com/ru/articles/791058
Глава 4. Прерывания и системные вызовы
https://habr.com/ru/articles/791286
Глава 3. Таблицы страниц
https://habr.com/ru/articles/792808
Инструменты для сборки и запуска xv6 под QEMU
https://habr.com/ru/articles/794326
Глава 2. Устройство операционной системы
https://habr.com/ru/articles/795735
Глава 1. Интерфейсы операционной системы
https://habr.com/ru/articles/797557
Хабр
Xv6: учебная Unix-подобная ОС. Глава 1. Интерфейсы операционной системы
Следующая: Глава 2. Устройство операционной системы Примечание. Авторы рекомендуют читать книгу вместе с исходным текстом xv6 . Авторы подготовили и лабораторные работы по xv6 . Xv6 работает на...
👍1
Pelmeni Wrapper: New Wrapper of Kazuar (Turla Backdoor)
https://lab52.io/blog/pelmeni-wrapper-new-wrapper-of-kazuar-turla-backdoor/
https://lab52.io/blog/pelmeni-wrapper-new-wrapper-of-kazuar-turla-backdoor/
Introducing APT-Hunter : Threat Hunting Tool via Windows Event Log
https://shells.systems/introducing-apt-hunter-threat-hunting-tool-via-windows-event-log/
#tools
https://shells.systems/introducing-apt-hunter-threat-hunting-tool-via-windows-event-log/
#tools
Keylogging in the Windows kernel with undocumented data structures
https://eversinc33.com/posts/kernel-mode-keylogging/
https://eversinc33.com/posts/kernel-mode-keylogging/
Initial Access Operations Part 2: Offensive DevOps
https://www.blackhillsinfosec.com/initial-access-operations-part-2/
https://www.blackhillsinfosec.com/initial-access-operations-part-2/
"Introduction to Reverse Engineering with Ghidra"
https://voidstarsec.com/ghidra.html#:~:text=Introduction%20to%20Reverse%20Engineering%20with%20Ghidra
https://voidstarsec.com/ghidra.html#:~:text=Introduction%20to%20Reverse%20Engineering%20with%20Ghidra
❤1
Reverse engineering of Android Phoenix RAT
Analysis: https://cryptax.medium.com/reverse-engineering-of-android-phoenix-b59693c03bd3
Phoenix overview: https://cryptax.medium.com/android-phoenix-authors-claims-sample-identification-and-trends-f199cbc9901d
Analysis: https://cryptax.medium.com/reverse-engineering-of-android-phoenix-b59693c03bd3
Phoenix overview: https://cryptax.medium.com/android-phoenix-authors-claims-sample-identification-and-trends-f199cbc9901d
ساختار فایل PE
- header
https://mrpythonblog.ir/pe1/
- section
https://mrpythonblog.ir/pe2/
-exports
https://mrpythonblog.ir/pe3/
-imports
https://mrpythonblog.ir/pe4/
-relocation
https://mrpythonblog.ir/pe5/
#pe
@MrPythonBlog
- header
https://mrpythonblog.ir/pe1/
- section
https://mrpythonblog.ir/pe2/
-exports
https://mrpythonblog.ir/pe3/
-imports
https://mrpythonblog.ir/pe4/
-relocation
https://mrpythonblog.ir/pe5/
#pe
@MrPythonBlog
🔥7
Source Byte
ساختار فایل PE - header https://mrpythonblog.ir/pe1/ - section https://mrpythonblog.ir/pe2/ -exports https://mrpythonblog.ir/pe3/ -imports https://mrpythonblog.ir/pe4/ -relocation https://mrpythonblog.ir/pe5/ #pe @MrPythonBlog
Writing pe-parser and explain about its structure
https://0xrick.github.io/win-internals/pe1/
https://0xrick.github.io/categories/#win-internals
#pe
https://0xrick.github.io/win-internals/pe1/
#pe
0xRick's Blog
A dive into the PE file format - Introduction
A dive into the PE file format - Introduction What is this ? This is going to be a series of blog posts covering PE files in depth, it’s going to include a range of different topics, mainly the structure of PE files on disk and the way PE files get mapped…
🔥6👍1