List of callbacks and codes that we can use them to execute shellcode
(Alternative Shellcode Execution Via Callbacks)
https://github.com/aahmad097/AlternativeShellcodeExec
#malware_dev
(Alternative Shellcode Execution Via Callbacks)
https://github.com/aahmad097/AlternativeShellcodeExec
#malware_dev
👍2
Program to Inject a DLL into a process from memory
https://github.com/BlackHat-Ashura/Reflective_DLL_Injection
https://github.com/BlackHat-Ashura/Reflective_DLL_Injection
GitHub
GitHub - BlackHat-Ashura/Reflective_DLL_Injection: Program to Inject a DLL into a process from memory.
Program to Inject a DLL into a process from memory. - BlackHat-Ashura/Reflective_DLL_Injection
❤2
Forwarded from 4e6571
🥰4
NIST Cybersecurity Framework
https://www.youtube.com/playlist?list=PLxC28bkWNxkM1AVwmhF0Xfbs8F-NMox0I
https://www.youtube.com/playlist?list=PLxC28bkWNxkM1AVwmhF0Xfbs8F-NMox0I
❤5
A very good introductory series of articles examining the process of driver development for Windows (NT):
Part 1, part 2,....
(The material is old, but gold)
#windows #drivers
Part 1, part 2,....
(The material is old, but gold)
#windows #drivers
CodeProject
Driver Development Part 1: Introduction to Drivers
This article will go into the basics of creating a simple driver.
👍4👎1
One of the "essential" windows auditing tools, add my other favorites like rpcview, process hacker, sysinternals, ghidra, wireshark xpe viewer, windbg, imhex and visual studio. Get James Forshaw's NtObjectManager thing too, seems useful for parsing MIDL like rpcviewer.
PipeViewer - A Tool That Shows Detailed Information About Named Pipes In Windows
https://github.com/cyberark/PipeViewer
credit : Eviatar Gerzi
#tweet , source
PipeViewer - A Tool That Shows Detailed Information About Named Pipes In Windows
https://github.com/cyberark/PipeViewer
credit : Eviatar Gerzi
#tweet , source
❤7👍2
Forwarded from Волосатый бублик
[ Testing LFI in Windows: How I (never) got a $30000 bounty ]
Another great post by adeadfed!
https://adeadfed.com/posts/testing-lfi-in-windows-how-i-never-got-a-30000-bounty/
Another great post by adeadfed!
https://adeadfed.com/posts/testing-lfi-in-windows-how-i-never-got-a-30000-bounty/
🔥6👍1👎1
if you want to using Function stomping technique you have to know this about windows:
example:
Link
for example Kernel32.dll, a common DLL, might have different addresses in two processes(ASLR), but functions like VirtualAlloc, exported from Kernel32.dll, will have the same address in both processes.
example:
Link
🔥3👏1😁1
Forwarded from Sina
HyperDbg v0.8.2 is now released! 🔥
This update brings support for functions in the noscript engine.
Read more:
https://docs.hyperdbg.org/commands/noscripting-language/constants-and-functions
## [0.8.2.0] - 2024-03-19
New release of the HyperDbg Debugger.
### Added
- Add user-defined functions and variable types in noscript engine
### Changed
- Fix debuggee crash after running the '.debug close' command on the debugger
- The problem with adding edge MTRR pages is fixed
- All compiler/linker warnings of kernel-mode modules are fixed
- User/Kernel modules of HyperDbg now compiled with "treat warning as error"
- After downloading new symbols it is automatically loaded
- Fix error messages/comments spelling typos
This update brings support for functions in the noscript engine.
Read more:
https://docs.hyperdbg.org/commands/noscripting-language/constants-and-functions
## [0.8.2.0] - 2024-03-19
New release of the HyperDbg Debugger.
### Added
- Add user-defined functions and variable types in noscript engine
### Changed
- Fix debuggee crash after running the '.debug close' command on the debugger
- The problem with adding edge MTRR pages is fixed
- All compiler/linker warnings of kernel-mode modules are fixed
- User/Kernel modules of HyperDbg now compiled with "treat warning as error"
- After downloading new symbols it is automatically loaded
- Fix error messages/comments spelling typos
docs.hyperdbg.org
Constants & Functions | HyperDbg Documentation
Denoscription of constants and functions
🔥3❤1
Forwarded from Hide01
سلام و درود
فرا رسیدن عید نوروز رو از صمیم قلب به شما همراهان گرامی تبریک میگوییم، با آرزوی بهترینها برای شما در این سال نو💥 ✨
📌 پاسخ دهی به تیکت ها در ایام عید بدون تغییر روال کاری همه روزه انجام میشود.
Hello and greetings
We sincerely congratulate you dear companions on the arrival of Nowruz, wishing you the best in this new year💥 ✨
📌 Answering tickets during Eid is done every day without changing the work routine.
Best Regards, Hide01
فرا رسیدن عید نوروز رو از صمیم قلب به شما همراهان گرامی تبریک میگوییم، با آرزوی بهترینها برای شما در این سال نو
Hello and greetings
We sincerely congratulate you dear companions on the arrival of Nowruz, wishing you the best in this new year
Best Regards, Hide01
Please open Telegram to view this post
VIEW IN TELEGRAM
🎉7🤡3
Command Line Argument Spoofing
https://kwcsec.gitbook.io/the-red-team-handbook/techniques/defense-evasion/misdirection/command-line-argument-spoofing
The PEB of a process holds the command line arguments of a process. This PEB resides in usermode which means that we can spoof our command line arguments as an unprivileged user.
https://kwcsec.gitbook.io/the-red-team-handbook/techniques/defense-evasion/misdirection/command-line-argument-spoofing
kwcsec.gitbook.io
Command Line Argument Spoofing | The Red Team Vade Mecum
❤5👍1
This media is not supported in your browser
VIEW IN TELEGRAM
Happy Nowruz everyone 🫰🏻
This year was a great year for me , I find valuable friends, and develop my personality a lot .
I wish for all of you great year and reaching your goals.
Best regards ,
ana🤍
What is Nowruz?
TLDR:
Nowruz means “new day” in Persian, also known as Persian New Year. More than 300 million people worldwide celebrate Nowruz including Afghanistan, Uzbekistan, India, Iran, Iraq, Kazakhstan, Pakistan, Tajikistan, and Turkey...
This year was a great year for me , I find valuable friends, and develop my personality a lot .
I wish for all of you great year and reaching your goals.
Best regards ,
ana🤍
What is Nowruz?
Nowruz means “new day” in Persian, also known as Persian New Year. More than 300 million people worldwide celebrate Nowruz including Afghanistan, Uzbekistan, India, Iran, Iraq, Kazakhstan, Pakistan, Tajikistan, and Turkey...
❤🔥11🍾3🔥2
C2 Development Series 4/4
credit : @preemptdev
[ 01 ] Introduction
[ 02 ] The C2 Architecture
[ 03 ] Building the Team Server
[ 04 ] Writing a C2 Implant
#C2 , #red_team ,
———
@islemolecule_source
credit : @preemptdev
[ 01 ] Introduction
[ 02 ] The C2 Architecture
[ 03 ] Building the Team Server
[ 04 ] Writing a C2 Implant
#C2 , #red_team ,
———
@islemolecule_source
❤6😱3
Reverse Engineering Dark Souls 3 Networking:
A DarkSouls fan wrote his own DS3OS server for the second and third parts. A series of articles about how he managed to reverse engineer the game’s network stack.
Link
A DarkSouls fan wrote his own DS3OS server for the second and third parts. A series of articles about how he managed to reverse engineer the game’s network stack.
Link
GitHub
GitHub - TLeonardUK/ds3os: Dark Souls - Open Server
Dark Souls - Open Server. Contribute to TLeonardUK/ds3os development by creating an account on GitHub.
🔥4❤1
New open source RAT on the scene Xeno Rat 🐭
GitHub
https://www.cyfirma.com/outofband/xeno-rat-a-new-remote-access-trojan-with-advance-capabilities/
GitHub
https://www.cyfirma.com/outofband/xeno-rat-a-new-remote-access-trojan-with-advance-capabilities/
🔥5