Source Byte – Telegram
Source Byte
7.76K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
VirtualBox E1000 Guest-to-Host Escape

https://github.com/MorteNoir1/virtualbox_e1000_0day
👍4🖕21😁1
👍3
Vulnerability Management Lifecycle in DevSecOps

Vulnerability management overview :

Stages of vulnerability management
+ Identification
+Observability
+Management


https://blog.gitguardian.com/vulnerability-management-lifecycle-in-devsecops/
———
@islemolecule_source
🔥6👍2
Forwarded from Reee Teeee
👍3🔥2
Forwarded from rico
cobaltstrike.zip
65.6 MB
by the way 4.5 decompiled u can recompile if u have skill u can patch the beacon xss rce bug
👍3🥰3
Locating kernel32 in base address in shellcode writing

Link1

Link2
🔥2👍1
Linux is not a secure operating system

Linux being secure is a common misconception in the security and privacy realm. Linux is thought to be secure primarily because of its source model, popular usage in servers, small userbase and confusion about its security features. This article is intended to debunk these misunderstandings by demonstrating the lack of various, important security mechanisms found in other desktop operating systems and identifying critical security problems within Linux's security model, across both user space and the kernel. Overall, other operating systems have a much stronger focus on security and have made many innovations in defensive security technologies, whereas Linux has fallen far behind.


https://madaidans-insecurities.github.io/linux.html

credit : madaidan
a security researcher who works on various open source projects, mainly Whonix.

#hardening ,
———
@islemolecule_source
🤯6🤣5👏3💯2😐2😢1🍾1
bypassing-av.pdf
1 MB
bypassing-av.pdf

Depend on pe file format
🔥4👍1
Abusing undocumented features to spoof PE section headers by x86matthew

https://secret.club/2023/06/05/spoof-pe-sections.html
2👍1
Execute shellcode via python
(Ctypes module)

https://youtu.be/n-nU2jCK5-c?si=JN3P8yu6M2_2wdwA
🔥3👍1🕊1
Forwarded from CyberSecurityTechnologies (-CST-)
🔥3👍1
‘Lavender’: The AI machine directing Israel’s bombing spree in Gaza

The Israeli army has marked tens of thousands of Gazans as suspects for assassination, using an AI targeting system with little human oversight and a permissive policy for casualties, +972 and Local Call reveal.


https://www.972mag.com/lavender-ai-israeli-army-gaza/
🤯4🍓1
This media is not supported in your browser
VIEW IN TELEGRAM
🤷‍♂😁
🔥37🖕28❤‍🔥2👎2😍2🤡1🗿1
Source Byte
🤷‍♂😁
This media is not supported in your browser
VIEW IN TELEGRAM
🖕128👍1🔥1👏1🌚1
Dump lsass using only Native APIs

https://github.com/ricardojoserf/NativeDump
🔥41
A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development

https://github.com/FabioBaroni/awesome-exploit-development
5
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.


https://github.com/secfigo/Awesome-Fuzzing
5👍1
Forwarded from white2hack 📚
OSED Notes: (Offensive Security Exploit Developer) by Zeyad Azima, 2024

Source
GitHub
Twitter

#pentest #useful #exam #celebrery
👍4❤‍🔥2
" The architecture of SAST tools: An explainer for developers "
More developers will have to fix security issues in the age of shifting left. Here, we break down how SAST tools can help them find and address vulnerabilities.

+Automate source code scanning.
+Expand vulnerability detection.
+Assist with manual code reviews.
+Software composition analysis (SCA)
+Dynamic application security testing (DAST)
+Interactive application security testing (IAST)


https://github.blog/2024-02-12-the-architecture-of-sast-tools-an-explainer-for-developers/

#devops
———
@islemolecule_source
4👍2😁1