Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Please open Telegram to view this post
VIEW IN TELEGRAM
Source Byte
Message
Get updated
Search Evasion Techniques by Names, Techniques, Definitions, Keywords

[ 01 ] https://unprotect.it/

[ 02 ] https://search.maldevacademy.com/
🔥5
🔥5
If you've ever wanted to live debug user mode Linux processes (e.g.: in WSL) from WinDbg, with 1.2402.24001.0, you can! Start up a gdbserver in WSL (e.g.: gdbserver localhost:1234 ./vim) and connect to it via WinDbg's "Connect to remote debugger"
Documentation for live Linux debugging with WinDbg can be found at:

https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/linux-live-remote-process-debugging

And

https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/linux-dwarf-symbols


#tweet
Credit : William R. Messmer
6
🔥41
This write-up covers the basics of working with Native Applications and some interesting things you can do with them.

https://www.protexity.com/post/going-native-malicious-native-applications


#tweet
Credit: Steve S.
🔥31
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Lost in Transaction: Process Doppelgänging
Tal Liberman
Eugene Kogan

https://docs.google.com/viewerng/viewer?url=https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf


hasherezade's PoC for doppleganging:
LINK
2😁2👍1🔥1
Organized list of my malware development resources
https://github.com/rootkit-io/awesome-malware-development



#malware_dev
🔥4👍1
x33fcon20_Pawel_Kordos,_Patryk_Czeczko_Malware_techniques_from_aggressor's.pdf
10.7 MB
MALWARE TECHNIQUES FROM AGGRESSOR'S PERSPECTIVE
PATRYK CZECZKO
PAWEŁ KORDOS

#malware_dev
👍7
Event Tracing for Windows (ETW): Your Friendly Neighborhood IPC Mechanism

https://www.preludesecurity.com/blog/event-tracing-for-windows-etw-your-friendly-neighborhood-ipc-mechanism

credit : @jsecurity101
5👍1🤡1