Source Byte – Telegram
Source Byte
7.76K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
👏4🔥2
Zero EAT touch way to retrieve function addresses
https://github.com/MzHmO/SymProcAddress
👍3
4🤡2
5
🔥4
List of callbacks and codes that we can use them to execute shellcode
(Alternative Shellcode Execution Via Callbacks)
https://github.com/aahmad097/AlternativeShellcodeExec

#malware_dev
👍2
Forwarded from 4e6571
Scorpio-Windows.Internals.(2020)
Practical Cryptography: Algorithms and Implementations Using C++” by Saiful Azad and Al-Sakib Khan Pathan, which provides a comprehensive guide to modern cryptography and demonstrates how to develop and implement cryptographic algorithms in C++.
🐳3
5
A very good introductory series of articles examining the process of driver development for Windows (NT):
Part 1, part 2,....

(The material is old, but gold)

#windows #drivers
👍4👎1
One of the "essential" windows auditing tools, add my other favorites like rpcview, process hacker, sysinternals, ghidra, wireshark xpe viewer, windbg, imhex and visual studio. Get James Forshaw's NtObjectManager thing too, seems useful for parsing MIDL like rpcviewer.



PipeViewer - A Tool That Shows Detailed Information About Named Pipes In Windows
https://github.com/cyberark/PipeViewer

credit : Eviatar Gerzi

#tweet , source
7👍2
Forwarded from Волосатый бублик
[ Testing LFI in Windows: How I (never) got a $30000 bounty ]

Another great post by adeadfed!

https://adeadfed.com/posts/testing-lfi-in-windows-how-i-never-got-a-30000-bounty/
🔥6👍1👎1
if you want to using Function stomping technique you have to know this about windows:

for example Kernel32.dll, a common DLL, might have different addresses in two processes(ASLR), but functions like VirtualAlloc, exported from Kernel32.dll, will have the same address in both processes.


example:

Link
🔥3👏1😁1