Source Byte – Telegram
Source Byte
7.76K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Forwarded from APT
This media is not supported in your browser
VIEW IN TELEGRAM
🖼️ Bypass Medium Paywall

A little lifehack if you, like me, come across paid articles from Medium. These sites allow you to read paid Medium articles for free:

🔗 https://freedium.cfd/<URL>
🔗 https://medium-forall.vercel.app/

#medium #premium #bypass
Please open Telegram to view this post
VIEW IN TELEGRAM
👍10
Urgent security alert for Fedora Linux 40 and Fedora Rawhide users
The xz package tar's were backdoored.

https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users

https://twitter.com/badsectorlabs/status/1773759444486177023
👍4🤡2
Massimiliano Tomassoli papers in exploitation

https://github.com/mtomassoli/papers/tree/master
👍4
Media is too big
VIEW IN TELEGRAM
📹 CppCon 2017: James McNellis “Everything You Ever Wanted to Know about DLLs”
👤 CppCon
6🔥2👍1
Nim_Programming_Lang.rar
739.5 MB
Nim programming which malware developers like that

Nim's cross-compilation features empower attackers to write a single malware variant, which can then be cross-compiled to target different platforms



a good candidate for writing software in a wide variety of application domains, ranging from web applications to kernels
👍6
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4
Forwarded from SoheilSec (Soheil Hashemi)
👍2🔥2
Dev 101: Bypassing ASLR on windows

“Note: This post is quite theoretical (yuk!) but I’ll work on providing a hands-on demo sometime in the future. Also given the current mitigations in Windows, you’ll need much more than bypassing ASLR”

https://www.abatchy.com/2017/06/exploit-dev-101-bypassing-aslr-on.html
👍7🔥1
In- the- Wild Windows LPE 0- days: Insights & Detection Strategies
This article will evaluate detection methods for Windows local privilege escalation techniques based on dynamic behaviors analysis using Elastic Defend features.
credit : SAMIR BOUSSEADEN


https://www.elastic.co/security-labs/itw-windows-lpe-0days-insights-and-detection-strategies
———
@islemolecule_source
👍4🔥1