Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
🔥41
This write-up covers the basics of working with Native Applications and some interesting things you can do with them.

https://www.protexity.com/post/going-native-malicious-native-applications


#tweet
Credit: Steve S.
🔥31
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Lost in Transaction: Process Doppelgänging
Tal Liberman
Eugene Kogan

https://docs.google.com/viewerng/viewer?url=https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf


hasherezade's PoC for doppleganging:
LINK
2😁2👍1🔥1
Organized list of my malware development resources
https://github.com/rootkit-io/awesome-malware-development



#malware_dev
🔥4👍1
x33fcon20_Pawel_Kordos,_Patryk_Czeczko_Malware_techniques_from_aggressor's.pdf
10.7 MB
MALWARE TECHNIQUES FROM AGGRESSOR'S PERSPECTIVE
PATRYK CZECZKO
PAWEŁ KORDOS

#malware_dev
👍7
Event Tracing for Windows (ETW): Your Friendly Neighborhood IPC Mechanism

https://www.preludesecurity.com/blog/event-tracing-for-windows-etw-your-friendly-neighborhood-ipc-mechanism

credit : @jsecurity101
5👍1🤡1
Rhysida Ransomware
Link


#malware_analysis
👍4
1802.09517.pdf
197.4 KB
Memory Tagging and how it improves C/C++ memory safety
🔥3👍2
👍2🔥2