Forwarded from Ralf Hacker Channel (Ralf Hacker)
Аналог
https://github.com/WKL-Sec/FuncAddressPro
#redteam #maldev #evasion
GetProcAddress, но написан на ассемблере. Гуд... https://github.com/WKL-Sec/FuncAddressPro
#redteam #maldev #evasion
GitHub
GitHub - WKL-Sec/FuncAddressPro: A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative…
A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress. - WKL-Sec/FuncAddressPro
👍2
Forwarded from .
Greybeard Qualification - Linux Internals.zip
810.7 MB
Greybeard Qualification - Linux Internals.zip
Linux network internals.zip
1.4 GB
Linux network internals.zip
Linux Kernel Development.zip
1.3 GB
Linux Kernel Development.zip
Linux Device Drivers.zip
431.6 MB
Linux Device Drivers.zip
❤9👍2
JSAC2024_2_3_sasada_hazuru_en.pdf
955.6 KB
Dark Side of VSCode
~ How Attacker Abuse VSCode as RAT ~
~ How Attacker Abuse VSCode as RAT ~
🔥4✍1😐1
winsos-poc: A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.
https://github.com/thiagopeixoto/winsos-poc.git
https://github.com/thiagopeixoto/winsos-poc.git
🔥5
UNDERSTANDING A PAYLOAD’S LIFE
Featuring Meterpreter & other guests
credit : Daniel López Jiménez
videos :
https://www.youtube.com/playlist?list=PLwb6et4T42ww1YrYGuX0KN71cw3ejG5IO
slides :
👇🏻
Featuring Meterpreter & other guests
credit : Daniel López Jiménez
videos :
https://www.youtube.com/playlist?list=PLwb6et4T42ww1YrYGuX0KN71cw3ejG5IO
slides :
👇🏻
❤7🤡2
Donex a new ransomware gang malware technical analysis
https://www.shadowstackre.com/analysis/donex
#malware_analysis
https://www.shadowstackre.com/analysis/donex
#malware_analysis
🔥6
Forwarded from AndroPX (SOS)
This media is not supported in your browser
VIEW IN TELEGRAM
Program in C
🤣21❤1🤔1
Anatomy of Offensive Tool Development
credit : Alex Reid
https://redsiege.com/blog/2024/01/graphstrike-developer/
credit : Alex Reid
https://redsiege.com/blog/2024/01/graphstrike-developer/
👍5💘1
Forwarded from white2hack 📚
Advanced Software Exploitation by Ptrace Security, 2019
In the first half of the course, attendees will use fuzzing, reverse engineering, and source code auditing, to attack a wide variety of applications (e.g. iTunes, Firefox, Vulnserver, etc.) and then use proven exploitation techniques to develop an exploit for one of the VMs (Windows 7, Windows 8.1 and Windows 10).
Then, in the second half of the course, the focus will shift from classic vulnerabilities to more advanced ones. In this section, students will learn how to escape Java sandbox using a type confusion vulnerability, how to circumvent the ASLR without pointer leaks, and how to use precise heap spraying, just to name a few.
By the end of this course, students will know how to find software vulnerabilities using fuzzing, reverse engineering, and source code auditing, and then how to write their own exploits in Python, JavaScript, or Java.
GitHub
About the course
Official page
#education #reverse #coding #python
In the first half of the course, attendees will use fuzzing, reverse engineering, and source code auditing, to attack a wide variety of applications (e.g. iTunes, Firefox, Vulnserver, etc.) and then use proven exploitation techniques to develop an exploit for one of the VMs (Windows 7, Windows 8.1 and Windows 10).
Then, in the second half of the course, the focus will shift from classic vulnerabilities to more advanced ones. In this section, students will learn how to escape Java sandbox using a type confusion vulnerability, how to circumvent the ASLR without pointer leaks, and how to use precise heap spraying, just to name a few.
By the end of this course, students will know how to find software vulnerabilities using fuzzing, reverse engineering, and source code auditing, and then how to write their own exploits in Python, JavaScript, or Java.
GitHub
About the course
Official page
#education #reverse #coding #python
🔥5👍2
Forwarded from white2hack 📚
Advanced Software Exploitation.7z
10.8 MB
Advanced Software Exploitation by Ptrace Security, 2019
🔥5👍1
Rhadamanthys –deep dive into the stealer’s components
https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/
https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/
👍4
IDA plugin to display the calls and strings referenced by a function as hints.
https://gist.github.com/williballenthin/eeea2093888e8d4004ec06b5a1dede1e
https://gist.github.com/williballenthin/eeea2093888e8d4004ec06b5a1dede1e
👍3
Source Byte pinned «Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures https://www.vergiliusproject.com/kernels #windows ——— @islemolecule_source»
Forwarded from white2hack 📚
Hacking Windows, first edition, Kevin Thomas, 2022
On November 20, 1985, Microsoft introduced the Windows operating environment which was nothing more than a graphical operating shell for MS-DOS.
Today we begin our journey into the Win32API. This book will take you step-by-step writing very simple Win32API’s in both x86 and x64 platforms in C and then reversing them both very carefully using the world’s most popular Hey Rays IDA Free tool which is a stripped down version of the IDA Pro tool used in more professional Reverse Engineering environments. Let’s begin...
#book #windows
On November 20, 1985, Microsoft introduced the Windows operating environment which was nothing more than a graphical operating shell for MS-DOS.
Today we begin our journey into the Win32API. This book will take you step-by-step writing very simple Win32API’s in both x86 and x64 platforms in C and then reversing them both very carefully using the world’s most popular Hey Rays IDA Free tool which is a stripped down version of the IDA Pro tool used in more professional Reverse Engineering environments. Let’s begin...
#book #windows
👍5❤2🔥1
Forwarded from white2hack 📚
learn hacking window.pdf
4.9 MB
Hacking Windows, first edition, Kevin Thomas, 2022
🔥4
Forwarded from Forensic In persian (Forensic Man)
Malware Analysis[MyEdition].pdf
10.9 MB
سلام و درود خدمت تمامی همراههای کانال فورنزیک به فارسی
ضمن آرزوی قبولی طاعات و عبادات قبلاً به شما قبلاً قول داده بودم که یک کتاب جامع و عملی در حوزه تحلیل بدافزار برای شما آماده کنم.
در این پست قصد دارم کتاب عملی تحلیل بدافزاری رو که بهتون قول داده بودم رو رونمایی کنم؛ توی این کتاب طی 200 صفحه به صورت کاملاً عملی، علمی و کاربردی به آموزش موضوع پرداختیم.
به جرأت میشه گفت که کاملترین کتاب تحلیل بدافزاری هست که به زبان فارسی منتشر شده، قطعاً از مطالعه کتاب لذت خواهید برد. سوالاتتون رو حتماً از ما (از طریق ایمیل) بپرسید در کوتاه ترین زمان پاسخگوی شما خواهیم بود.
رمز فایل : @forensicIR
MD5 Hash: DA31226349D1B594D749D411315A2A78
#MalwareAnalysis #تحلیل_بدافزار #تیم_آبی
ضمن آرزوی قبولی طاعات و عبادات قبلاً به شما قبلاً قول داده بودم که یک کتاب جامع و عملی در حوزه تحلیل بدافزار برای شما آماده کنم.
در این پست قصد دارم کتاب عملی تحلیل بدافزاری رو که بهتون قول داده بودم رو رونمایی کنم؛ توی این کتاب طی 200 صفحه به صورت کاملاً عملی، علمی و کاربردی به آموزش موضوع پرداختیم.
به جرأت میشه گفت که کاملترین کتاب تحلیل بدافزاری هست که به زبان فارسی منتشر شده، قطعاً از مطالعه کتاب لذت خواهید برد. سوالاتتون رو حتماً از ما (از طریق ایمیل) بپرسید در کوتاه ترین زمان پاسخگوی شما خواهیم بود.
رمز فایل : @forensicIR
MD5 Hash: DA31226349D1B594D749D411315A2A78
#MalwareAnalysis #تحلیل_بدافزار #تیم_آبی
❤5🤣5🔥1