Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
There is industry consensus on moving away from C/C++: "Secure by Design: Google’s Perspective on Memory Safety"

TLDR: Rust is not the answer.

https://security.googleblog.com/2024/03/secure-by-design-googles-perspective-on.html?m=1
👍5
researcher @ mrd0x released https://malapi.io , an online catalog of Windows APIs that are commonly used in malware. This is an incredible resource that helps to discern which APIs are worth scrutiny when performing analysis of the IAT.
❤‍🔥6
RSA Tutorial Collection.zip
6.1 MB
3
Search for almost anything. One week FREE access.



https://news.1rj.ru/str/AllInOneLeaksBOT
4
Source Byte
Offensive Pascal https://github.com/0xsp-SRD/mortar
Really?

Pascal?😐🙌
👍7
🔥2
OST2_LP_SecCode_Exploits.pdf
84 KB
👏1
Gemini won't return C++ coding help if you're under 18 because it "wants to preserve your safety".


It's a joke don't take it seriously
👀3👍1
Prevention_LOLBins.pdf
648.6 KB
"Prevention Strategies for Modern Living Off the Land Usage", 2024.
2
2
Forwarded from Source Chat
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Source Chat
Please open Telegram to view this post
VIEW IN TELEGRAM
Deep Dive into DLL Sideloading and DLL Hijacking

https://youtu.be/4aiAtGF9tF4

#malware_dev
🔥3
👍1👏1
Tips For Analyzing Delphi Binaries in IDA (Danabot)
https://www.youtube.com/watch?v=04RsqP_P9Ss
3
implementation examples of basic rootkit functionality and the basics of kernel driver development

https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1
🔥3
😭😭😭😭😭😭
😭22😁31👌1