👍4
🥰7
Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C
https://github.com/0x4141414141/Malware-Devlopment
https://github.com/0x4141414141/Malware-Devlopment
👍6
IACA Dark Web Investigation Support
Provided by International Anti Crime Academy (IACA) The Netherlands
https://iaca-darkweb-tools.com/
#Threat_Intelligence
Provided by International Anti Crime Academy (IACA) The Netherlands
https://iaca-darkweb-tools.com/
#Threat_Intelligence
👍3❤1
assembly programming with focus on Windows
credits : Siew Yi Liang
https://sonictk.github.io/asm_tutorial/
credits : Siew Yi Liang
https://sonictk.github.io/asm_tutorial/
👍8
Windows Secrets Extraction: A Summary
synacktiv😍
https://www.synacktiv.com/publications/windows-secrets-extraction-a-summary
https://www.synacktiv.com/publications/windows-secrets-extraction-a-summary
Synacktiv
Windows secrets extraction: a summary
🔥7👍1
Windows Pwnable Study from
SeungHyun Lee (a.k.a. "Xion")
https://github.com/leesh3288/WinPwn
https://github.com/FULLSHADE/WindowsExploitationResources
SeungHyun Lee (a.k.a. "Xion")
https://github.com/leesh3288/WinPwn
https://github.com/FULLSHADE/WindowsExploitationResources
X (formerly Twitter)
Xion (@0x10n) on X
CMU CSD PhD student / 2024 Top#0 Chrome VRP Researcher / Winner of Pwn2Own Vancouver '24, TyphoonPWN '24/'25, DEFCON 31 CTF, ... / PPP, KAIST GoN '18, @zer0pts
🔥9
How to Learn Binary Exploitation Roadmap
Courses: pwn.college and Nightmare: Roppers Remix
https://www.hoppersroppers.org/roadmap/training/pwning.html
Courses: pwn.college and Nightmare: Roppers Remix
https://www.hoppersroppers.org/roadmap/training/pwning.html
🔥6👍3❤2😐2🤩1
Reverse engineering blogs and others
https://xn--qckyd1c.xn--w8je.xn--tckwe/2021/10/02/Reverse-Engineering-Roadmap/
https://xn--qckyd1c.xn--w8je.xn--tckwe/2021/10/02/Reverse-Engineering-Roadmap/
❤6👍1🔥1
Forwarded from Reverse Dungeon
Windows exploitation by Fu11Shade
https://web.archive.org/web/20200506122824/https://fullpwnops.com/windows-exploitation-pathway.html
https://web.archive.org/web/20200506122824/https://fullpwnops.com/windows-exploitation-pathway.html
🔥5👍1
Source Byte pinned «Windows exploitation by Fu11Shade https://web.archive.org/web/20200506122824/https://fullpwnops.com/windows-exploitation-pathway.html»
Understanding_the_LFH.pdf
1.1 MB
Understanding_the_LFH.pdf
Low fragmentation heap
Blackhat USA 2010
Chris Valasek
X-Force Researcher
cvalasek@gmail.com
@nudehaberdasher
Low fragmentation heap
Blackhat USA 2010
Chris Valasek
X-Force Researcher
cvalasek@gmail.com
@nudehaberdasher
👍6
Source Byte
TD-LTE Irancell modem TK-2510 can be hacked/unlocked!? | Hardware Hack Part 1 Credit : saeed haghi-pour Language: Persian https://sisoog.com/2024/02/28/irancell-td-lte-modem-tk-2510-can-be-hacked-unlocked/
TD-LTE Irancell modem TK-2510 can be hacked/unlocked!? | Hardware Hack Part 2
Credit : saeed haghi-pour
Language: Persian
https://sisoog.com/2024/03/24/the-second-part-of-hardware-hacking/
Credit : saeed haghi-pour
Language: Persian
https://sisoog.com/2024/03/24/the-second-part-of-hardware-hacking/
👍8🔥1