NIST Cybersecurity Framework
https://www.youtube.com/playlist?list=PLxC28bkWNxkM1AVwmhF0Xfbs8F-NMox0I
https://www.youtube.com/playlist?list=PLxC28bkWNxkM1AVwmhF0Xfbs8F-NMox0I
❤5
A very good introductory series of articles examining the process of driver development for Windows (NT):
Part 1, part 2,....
(The material is old, but gold)
#windows #drivers
Part 1, part 2,....
(The material is old, but gold)
#windows #drivers
CodeProject
Driver Development Part 1: Introduction to Drivers
This article will go into the basics of creating a simple driver.
👍4👎1
One of the "essential" windows auditing tools, add my other favorites like rpcview, process hacker, sysinternals, ghidra, wireshark xpe viewer, windbg, imhex and visual studio. Get James Forshaw's NtObjectManager thing too, seems useful for parsing MIDL like rpcviewer.
PipeViewer - A Tool That Shows Detailed Information About Named Pipes In Windows
https://github.com/cyberark/PipeViewer
credit : Eviatar Gerzi
#tweet , source
PipeViewer - A Tool That Shows Detailed Information About Named Pipes In Windows
https://github.com/cyberark/PipeViewer
credit : Eviatar Gerzi
#tweet , source
❤7👍2
Forwarded from Волосатый бублик
[ Testing LFI in Windows: How I (never) got a $30000 bounty ]
Another great post by adeadfed!
https://adeadfed.com/posts/testing-lfi-in-windows-how-i-never-got-a-30000-bounty/
Another great post by adeadfed!
https://adeadfed.com/posts/testing-lfi-in-windows-how-i-never-got-a-30000-bounty/
🔥6👍1👎1
if you want to using Function stomping technique you have to know this about windows:
example:
Link
for example Kernel32.dll, a common DLL, might have different addresses in two processes(ASLR), but functions like VirtualAlloc, exported from Kernel32.dll, will have the same address in both processes.
example:
Link
🔥3👏1😁1
Forwarded from Sina
HyperDbg v0.8.2 is now released! 🔥
This update brings support for functions in the noscript engine.
Read more:
https://docs.hyperdbg.org/commands/noscripting-language/constants-and-functions
## [0.8.2.0] - 2024-03-19
New release of the HyperDbg Debugger.
### Added
- Add user-defined functions and variable types in noscript engine
### Changed
- Fix debuggee crash after running the '.debug close' command on the debugger
- The problem with adding edge MTRR pages is fixed
- All compiler/linker warnings of kernel-mode modules are fixed
- User/Kernel modules of HyperDbg now compiled with "treat warning as error"
- After downloading new symbols it is automatically loaded
- Fix error messages/comments spelling typos
This update brings support for functions in the noscript engine.
Read more:
https://docs.hyperdbg.org/commands/noscripting-language/constants-and-functions
## [0.8.2.0] - 2024-03-19
New release of the HyperDbg Debugger.
### Added
- Add user-defined functions and variable types in noscript engine
### Changed
- Fix debuggee crash after running the '.debug close' command on the debugger
- The problem with adding edge MTRR pages is fixed
- All compiler/linker warnings of kernel-mode modules are fixed
- User/Kernel modules of HyperDbg now compiled with "treat warning as error"
- After downloading new symbols it is automatically loaded
- Fix error messages/comments spelling typos
docs.hyperdbg.org
Constants & Functions | HyperDbg Documentation
Denoscription of constants and functions
🔥3❤1
Forwarded from Hide01
سلام و درود
فرا رسیدن عید نوروز رو از صمیم قلب به شما همراهان گرامی تبریک میگوییم، با آرزوی بهترینها برای شما در این سال نو💥 ✨
📌 پاسخ دهی به تیکت ها در ایام عید بدون تغییر روال کاری همه روزه انجام میشود.
Hello and greetings
We sincerely congratulate you dear companions on the arrival of Nowruz, wishing you the best in this new year💥 ✨
📌 Answering tickets during Eid is done every day without changing the work routine.
Best Regards, Hide01
فرا رسیدن عید نوروز رو از صمیم قلب به شما همراهان گرامی تبریک میگوییم، با آرزوی بهترینها برای شما در این سال نو
Hello and greetings
We sincerely congratulate you dear companions on the arrival of Nowruz, wishing you the best in this new year
Best Regards, Hide01
Please open Telegram to view this post
VIEW IN TELEGRAM
🎉7🤡3
Command Line Argument Spoofing
https://kwcsec.gitbook.io/the-red-team-handbook/techniques/defense-evasion/misdirection/command-line-argument-spoofing
The PEB of a process holds the command line arguments of a process. This PEB resides in usermode which means that we can spoof our command line arguments as an unprivileged user.
https://kwcsec.gitbook.io/the-red-team-handbook/techniques/defense-evasion/misdirection/command-line-argument-spoofing
kwcsec.gitbook.io
Command Line Argument Spoofing | The Red Team Vade Mecum
❤5👍1
This media is not supported in your browser
VIEW IN TELEGRAM
Happy Nowruz everyone 🫰🏻
This year was a great year for me , I find valuable friends, and develop my personality a lot .
I wish for all of you great year and reaching your goals.
Best regards ,
ana🤍
What is Nowruz?
TLDR:
Nowruz means “new day” in Persian, also known as Persian New Year. More than 300 million people worldwide celebrate Nowruz including Afghanistan, Uzbekistan, India, Iran, Iraq, Kazakhstan, Pakistan, Tajikistan, and Turkey...
This year was a great year for me , I find valuable friends, and develop my personality a lot .
I wish for all of you great year and reaching your goals.
Best regards ,
ana🤍
What is Nowruz?
Nowruz means “new day” in Persian, also known as Persian New Year. More than 300 million people worldwide celebrate Nowruz including Afghanistan, Uzbekistan, India, Iran, Iraq, Kazakhstan, Pakistan, Tajikistan, and Turkey...
❤🔥11🍾3🔥2
C2 Development Series 4/4
credit : @preemptdev
[ 01 ] Introduction
[ 02 ] The C2 Architecture
[ 03 ] Building the Team Server
[ 04 ] Writing a C2 Implant
#C2 , #red_team ,
———
@islemolecule_source
credit : @preemptdev
[ 01 ] Introduction
[ 02 ] The C2 Architecture
[ 03 ] Building the Team Server
[ 04 ] Writing a C2 Implant
#C2 , #red_team ,
———
@islemolecule_source
❤6😱3
Reverse Engineering Dark Souls 3 Networking:
A DarkSouls fan wrote his own DS3OS server for the second and third parts. A series of articles about how he managed to reverse engineer the game’s network stack.
Link
A DarkSouls fan wrote his own DS3OS server for the second and third parts. A series of articles about how he managed to reverse engineer the game’s network stack.
Link
GitHub
GitHub - TLeonardUK/ds3os: Dark Souls - Open Server
Dark Souls - Open Server. Contribute to TLeonardUK/ds3os development by creating an account on GitHub.
🔥4❤1
New open source RAT on the scene Xeno Rat 🐭
GitHub
https://www.cyfirma.com/outofband/xeno-rat-a-new-remote-access-trojan-with-advance-capabilities/
GitHub
https://www.cyfirma.com/outofband/xeno-rat-a-new-remote-access-trojan-with-advance-capabilities/
🔥5
Bypassing Defender on modern Windows 10 systems
https://www.purpl3f0xsecur1ty.tech/2021/03/30/av_evasion.html
https://www.purpl3f0xsecur1ty.tech/2021/03/30/av_evasion.html
Purpl3 F0x Secur1ty
Bypassing Defender on modern Windows 10 systems
Intro
👍6👏1
Automated Multi UAC BYPASS for win10|win11|ws2019|ws2022
(PS1)
https://github.com/x0xr00t/Automated-MUlti-UAC-Bypass
(PS1)
https://github.com/x0xr00t/Automated-MUlti-UAC-Bypass
👍6
Forwarded from white2hack 📚
God Penetration Testing Reference Bank
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet. This is a collection of resources, noscripts and easy to follow how-to's. I have been gathering (and continuing to gather) in preparation for the OSCP as well as for general pentesting. Feel free to use however you want!
GitHub
#pentest
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet. This is a collection of resources, noscripts and easy to follow how-to's. I have been gathering (and continuing to gather) in preparation for the OSCP as well as for general pentesting. Feel free to use however you want!
GitHub
#pentest
👍4❤2👎1
Forwarded from Source Byte (Anastasia 🐞)
ETW series
[ 1 ] ETW visualization
[ 2 ] Uncovering Windows Events
[ 3 ] ETW internals for security research and forensics
[ 4 ] Exploiting a “CVE-2020-1034” Vulnerability – In 35 Easy Steps or Less!
[ 5 ] Design issues of modern EDRs: bypassing ETW-based solutions
[ 6 ] A Primer On Event Tracing For Windows (ETW)
[ 7 ] Windows 10 ETW Events references collection
[ 8 ] evading EDR book [ 1 ] , [ 2 ]
[ 9 ] Detecting In-Memory Threats with Kernel ETW Call Stacks
[ 10 ] Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers
[ 11 ] A Begginers All Inclusive Guide to ETW
[ 12 ] ETW References
[ 13 ] Give Me an E, Give Me a T, Give Me a W. What Do You Get? RPC! (pars events from the RPC ETW)
[ 14 ] Attacks on ETW Blind EDR Sensors ( black hat con )
[ 15 ] This write-up will present a case study of using ETW (Event Tracing for Windows) to analyze an active Cobalt Strike Beacon that was still active and communicating to it's C2 Server.
[ 16 ] Event Tracing for Windows (ETW): Your Friendly Neighborhood IPC Mechanism
[ 17 ] coming soon...
———
@islemolecule_source
[ 1 ] ETW visualization
[ 2 ] Uncovering Windows Events
[ 3 ] ETW internals for security research and forensics
[ 4 ] Exploiting a “CVE-2020-1034” Vulnerability – In 35 Easy Steps or Less!
[ 5 ] Design issues of modern EDRs: bypassing ETW-based solutions
[ 6 ] A Primer On Event Tracing For Windows (ETW)
[ 7 ] Windows 10 ETW Events references collection
[ 8 ] evading EDR book [ 1 ] , [ 2 ]
[ 9 ] Detecting In-Memory Threats with Kernel ETW Call Stacks
[ 10 ] Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers
[ 11 ] A Begginers All Inclusive Guide to ETW
[ 12 ] ETW References
[ 13 ] Give Me an E, Give Me a T, Give Me a W. What Do You Get? RPC! (pars events from the RPC ETW)
[ 14 ] Attacks on ETW Blind EDR Sensors ( black hat con )
[ 15 ] This write-up will present a case study of using ETW (Event Tracing for Windows) to analyze an active Cobalt Strike Beacon that was still active and communicating to it's C2 Server.
[ 16 ] Event Tracing for Windows (ETW): Your Friendly Neighborhood IPC Mechanism
[ 17 ] coming soon...
———
@islemolecule_source
👍4🔥1
Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.
🔎GitHub
———
@islemolecule_source
🔎GitHub
———
@islemolecule_source
👍5
Course materials for Malware Analysis by RPISEC
https://github.com/RPISEC/Malware/tree/master/Lectures
https://github.com/RPISEC/Malware/tree/master/Lectures
👍2
What are the resources to learn malware analysis?
https://www.quora.com/What-are-the-resources-to-learn-malware-analysis
https://www.quora.com/What-are-the-resources-to-learn-malware-analysis
Quora
What are the resources to learn malware analysis?
1 person wants answers to this question. Be the first to answer.
👍2