Source Byte – Telegram
Source Byte
7.76K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
SyzRetrospector: A Large-Scale Retrospective Study of Syzbot

credit : Ardalan Amiri Sani , Zhiyun Qian
6
2401.11642.pdf
2.2 MB
👍3
Source Code Panel Web + Client + Instruction.zip
82 MB
XSSLite Stealer
🤯5👍1
RavinCTF_Inspect_Element_Writeups.rar
6.2 MB
رایتاپ های سی تی اف راوین
🔥7👎3
JSAC2024_2_3_sasada_hazuru_en.pdf
955.6 KB
Dark Side of VSCode
~ How Attacker Abuse VSCode as RAT ~
🔥41😐1
winsos-poc: A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.

https://github.com/thiagopeixoto/winsos-poc.git
🔥5
UNDERSTANDING A PAYLOAD’S LIFE
Featuring Meterpreter & other guests
credit : Daniel López Jiménez

videos :
https://www.youtube.com/playlist?list=PLwb6et4T42ww1YrYGuX0KN71cw3ejG5IO

slides :
👇🏻
7🤡2
Understanding_a_Payloads_Life.pdf
4.7 MB
9🤡3
Donex a new ransomware gang malware technical analysis
https://www.shadowstackre.com/analysis/donex


#malware_analysis
🔥6
Forwarded from AndroPX (SOS)
This media is not supported in your browser
VIEW IN TELEGRAM
Program in C
🤣211🤔1
Anatomy of Offensive Tool Development
credit : Alex Reid

https://redsiege.com/blog/2024/01/graphstrike-developer/
👍5💘1
Forwarded from white2hack 📚
Advanced Software Exploitation by Ptrace Security, 2019

In the first half of the course, attendees will use fuzzing, reverse engineering, and source code auditing, to attack a wide variety of applications (e.g. iTunes, Firefox, Vulnserver, etc.) and then use proven exploitation techniques to develop an exploit for one of the VMs (Windows 7, Windows 8.1 and Windows 10).

Then, in the second half of the course, the focus will shift from classic vulnerabilities to more advanced ones. In this section, students will learn how to escape Java sandbox using a type confusion vulnerability, how to circumvent the ASLR without pointer leaks, and how to use precise heap spraying, just to name a few.

By the end of this course, students will know how to find software vulnerabilities using fuzzing, reverse engineering, and source code auditing, and then how to write their own exploits in Python, JavaScript, or Java.

GitHub
About the course
Official page

#education #reverse #coding #python
🔥5👍2
Forwarded from white2hack 📚
Advanced Software Exploitation.7z
10.8 MB
Advanced Software Exploitation by Ptrace Security, 2019
🔥5👍1
👍4
IDA plugin to display the calls and strings referenced by a function as hints.


https://gist.github.com/williballenthin/eeea2093888e8d4004ec06b5a1dede1e
👍3
Source Byte pinned «Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures https://www.vergiliusproject.com/kernels #windows ——— @islemolecule_source»