Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Forwarded from Reverse Dungeon
Reverse Dungeon
MIT Operating System Engineering 6.1810(6.S081) Course labs, pdfs, books, links, videos included https://github.com/yaruwangway/6.S081 https://youtube.com/playlist?list=PLTsf9UeqkReZHXWY9yJvTwLJWYYPcKEqK&si=zt7GV6w5zFD-Vau4 CS 162 Berkley https://youtu…
Несколько переведённых глав из книжки об операционной системе, разбирающейся в курсе:


Глава 6. Блокировки
https://habr.com/ru/articles/789478

Глава 5. Прерывания и драйверы устройств
https://habr.com/ru/articles/791058

Глава 4. Прерывания и системные вызовы
https://habr.com/ru/articles/791286

Глава 3. Таблицы страниц
https://habr.com/ru/articles/792808

Инструменты для сборки и запуска xv6 под QEMU
https://habr.com/ru/articles/794326

Глава 2. Устройство операционной системы
https://habr.com/ru/articles/795735

Глава 1. Интерфейсы операционной системы
https://habr.com/ru/articles/797557
👍1
Pelmeni Wrapper: New Wrapper of Kazuar (Turla Backdoor)

https://lab52.io/blog/pelmeni-wrapper-new-wrapper-of-kazuar-turla-backdoor/
Introducing APT-Hunter : Threat Hunting Tool via Windows Event Log

https://shells.systems/introducing-apt-hunter-threat-hunting-tool-via-windows-event-log/

#tools
Keylogging in the Windows kernel with undocumented data structures

https://eversinc33.com/posts/kernel-mode-keylogging/
 Initial Access Operations Part 2: Offensive DevOps

https://www.blackhillsinfosec.com/initial-access-operations-part-2/
1
🔥7
Source Byte pinned «ساختار فایل PE - header https://mrpythonblog.ir/pe1/ - section https://mrpythonblog.ir/pe2/ -exports https://mrpythonblog.ir/pe3/ -imports https://mrpythonblog.ir/pe4/ -relocation https://mrpythonblog.ir/pe5/ #pe @MrPythonBlog»
Sark (named after the notorious Tron villain) is an object-oriented noscripting layer written on top of IDAPython. Sark is easy to use and provides tools for writing advanced noscripts and plugins.


https://sark.readthedocs.io/en/latest/


#tools
ARTeam_tutorials.zip
557.3 MB
RCE ARTeam Exploit Development Tutorials

#pwn
#ARTeam
6
Source Byte
pe-file-format-compendium-11-by-goppit-arteam.pdf
Pe explanation from ARTeam

Best
5
There is industry consensus on moving away from C/C++: "Secure by Design: Google’s Perspective on Memory Safety"

TLDR: Rust is not the answer.

https://security.googleblog.com/2024/03/secure-by-design-googles-perspective-on.html?m=1
👍5
researcher @ mrd0x released https://malapi.io , an online catalog of Windows APIs that are commonly used in malware. This is an incredible resource that helps to discern which APIs are worth scrutiny when performing analysis of the IAT.
❤‍🔥6
RSA Tutorial Collection.zip
6.1 MB
3