Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Lost in Transaction: Process Doppelgänging
Tal Liberman
Eugene Kogan

https://docs.google.com/viewerng/viewer?url=https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf


hasherezade's PoC for doppleganging:
LINK
2😁2👍1🔥1
Organized list of my malware development resources
https://github.com/rootkit-io/awesome-malware-development



#malware_dev
🔥4👍1
x33fcon20_Pawel_Kordos,_Patryk_Czeczko_Malware_techniques_from_aggressor's.pdf
10.7 MB
MALWARE TECHNIQUES FROM AGGRESSOR'S PERSPECTIVE
PATRYK CZECZKO
PAWEŁ KORDOS

#malware_dev
👍7
Event Tracing for Windows (ETW): Your Friendly Neighborhood IPC Mechanism

https://www.preludesecurity.com/blog/event-tracing-for-windows-etw-your-friendly-neighborhood-ipc-mechanism

credit : @jsecurity101
5👍1🤡1
Rhysida Ransomware
Link


#malware_analysis
👍4
1802.09517.pdf
197.4 KB
Memory Tagging and how it improves C/C++ memory safety
🔥3👍2
👍2🔥2
TLS-Cryptography-In-Depth.rar
8.7 MB
TLS-Cryptography-In-Depth.rar
👍4
Forwarded from vx-underground
"Can a .txt file be malicious?"

Short answer: No

Long answer: Anything is possible through the power of Windows HKEY_CLASSES_ROOT
😁4👍3👏1
Forwarded from vx-underground
vx-underground
"Can a .txt file be malicious?" Short answer: No Long answer: Anything is possible through the power of Windows HKEY_CLASSES_ROOT
tl;dr modify shell open command (default) to malicious payload with subsequent invocation of text editor + parameters. The .txt file won't be malicious, but the thing responsible for opening them will be

¯\_(ツ)_/¯
👏3👍2🤷1