Source Byte – Telegram
Source Byte
7.76K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Understanding the PE+ File Format
credit :allthingsida

[ 01 ] The Headers

[ 02 ] Imports

[ 03 ] Exports

[ 04 ] Entry Points and TLS Callbacks


———
@islemolecule_source
👍3🥰31
Forwarded from SoheilSec (Soheil Hashemi)
Year_in_Review_of_ZeroDays.pdf
953.4 KB
A review of zero-day in-the-wild exploits in 2023 [ TAG + Mandiant ]
In 2023, Google observed 97 zero-day vulnerabilities exploited in-the-wild. That’s over 50 percent more than in 2022, but still shy of 2021’s record of 106. Today, Google published its fifth annual review of zero-days exploited in-the-wild, marking the first time Google’s Threat Analysis Group (TAG) and Mandiant teamed up on the report.
https://blog.google/technology/safety-security/a-review-of-zero-day-in-the-wild-exploits-in-2023
4👍3
Windows Defender Killer | C++ Code Disabling Permanently Windows Defender using Registry Keys

https://github.com/S12cybersecurity/WinDefenderKiller
👍5😁3🤣1
👍6🤔1
c2_obf.zip
4.2 MB
A basic concept of obfuscating command and control (C2) servers securely with Redirectors.
👍5🥰3
Go 101
an up-to-date knowledge base for Go programming self learning

https://go101.org/

-= Go (Fundamentals) 101 =-
-= Go Generics 101 =-
-= Go Optimizations 101 =-
-= Go Details & Tips 101 =-
-= Go Quizzes 101 =-
-= Go 101 Apps & Libs =-
-= Go 101 Blog =-



———
@islemolecule_source
👍4
Forwarded from H1gh l4nd3r
IDA 8.4 Setup.rar
456.6 MB
From VT
👍71
AWE Prep
OffSec EXP-401 Advanced Windows Exploitation (AWE)
credit : talson

Windows Kernel Exploitation
Ghidra Setup & Tips
Browser Exploitation
Hypervisor Exploitation


https://talson.notion.site/AWE-Prep-c820706e05be43cf9fb434625914c171
6👍1💔1
Low-Level x86-64 Architecture, Linking & Loading, Memory Management, etc...
from SANS sec660.4 (Exploiting Linux for Penetration Testers)
credit: Stephen Sims

https://www.youtube.com/watch?v=I37AJebKh2Y

———
@islemolecule_source
👍7❤‍🔥51
Structure-Aware linux kernel Fuzzing with libFuzzer
I decided to experiment with KCOV and see how I can hook it into libfuzzer and boot the kernel without spending too much on building a root file system.

credit: Meysam

https://r00tkitsmm.github.io/fuzzing/2024/03/27/libffuzzerkernel.html
❤‍🔥5👍2
Forwarded from APT
This media is not supported in your browser
VIEW IN TELEGRAM
🖼️ Bypass Medium Paywall

A little lifehack if you, like me, come across paid articles from Medium. These sites allow you to read paid Medium articles for free:

🔗 https://freedium.cfd/<URL>
🔗 https://medium-forall.vercel.app/

#medium #premium #bypass
Please open Telegram to view this post
VIEW IN TELEGRAM
👍10
Urgent security alert for Fedora Linux 40 and Fedora Rawhide users
The xz package tar's were backdoored.

https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users

https://twitter.com/badsectorlabs/status/1773759444486177023
👍4🤡2
Massimiliano Tomassoli papers in exploitation

https://github.com/mtomassoli/papers/tree/master
👍4
Media is too big
VIEW IN TELEGRAM
📹 CppCon 2017: James McNellis “Everything You Ever Wanted to Know about DLLs”
👤 CppCon
6🔥2👍1
Nim_Programming_Lang.rar
739.5 MB
Nim programming which malware developers like that

Nim's cross-compilation features empower attackers to write a single malware variant, which can then be cross-compiled to target different platforms



a good candidate for writing software in a wide variety of application domains, ranging from web applications to kernels
👍6
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4
Forwarded from SoheilSec (Soheil Hashemi)
👍2🔥2