Source Byte – Telegram
Source Byte
7.76K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
🤷‍♂😁
🔥37🖕28❤‍🔥2👎2😍2🤡1🗿1
Source Byte
🤷‍♂😁
This media is not supported in your browser
VIEW IN TELEGRAM
🖕128👍1🔥1👏1🌚1
Dump lsass using only Native APIs

https://github.com/ricardojoserf/NativeDump
🔥41
A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development

https://github.com/FabioBaroni/awesome-exploit-development
5
A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.


https://github.com/secfigo/Awesome-Fuzzing
5👍1
Forwarded from white2hack 📚
OSED Notes: (Offensive Security Exploit Developer) by Zeyad Azima, 2024

Source
GitHub
Twitter

#pentest #useful #exam #celebrery
👍4❤‍🔥2
" The architecture of SAST tools: An explainer for developers "
More developers will have to fix security issues in the age of shifting left. Here, we break down how SAST tools can help them find and address vulnerabilities.

+Automate source code scanning.
+Expand vulnerability detection.
+Assist with manual code reviews.
+Software composition analysis (SCA)
+Dynamic application security testing (DAST)
+Interactive application security testing (IAST)


https://github.blog/2024-02-12-the-architecture-of-sast-tools-an-explainer-for-developers/

#devops
———
@islemolecule_source
4👍2😁1
Forwarded from Go Casts 🚀
یه مقاله درجه یک درباره container networking

How Container Networking Works: a Docker Bridge Network From Scratch
https://labs.iximiuz.com/tutorials/container-networking-from-scratch

@gocasts
2👍2👏1
Tons of trainings out there for implant dev now as of just last year even.

- Pavel has his own

https://training.trainsec.net/malware-analysis-and-development-workshop

- there’s Maldev Academy which is great
- there’s ODT from a Microsoft dude

https://courses.ask-academy.live/courses/offensive-development-and-tradecraft

- SANS has an implant dev course

https://www.sans.org/cyber-security-courses/red-team-operations-developing-custom-tools-windows/

- CodeMachine had some but I don’t think they are public offerings anymore
- Paranoid Ninja BRC4 author had some



#malware_dev
👍4🔥2
DLL Proxying using forwards with absolute paths
https://github.com/mrexodia/perfect-dll-proxy
👍3🔥1
Forwarded from H1gh l4nd3r
Code Machine - KERRKT hide01.ir.rar
4.7 MB
🔥4👍21
Forwarded from H1gh l4nd3r
Password: hide01.ir
👍4🔥2
Average windows fan
🥰6🤣5👍3
Forwarded from CyberSecurityTechnologies (-CST-)
Malware_Techniques_AHU.pdf
62.9 MB
#Malware_analysis
"Exploring Infostealer Malware Techniques on Automotive Head Units", 2024.
👍3
" Security is a process, not a product. Nor a language "
Rust can help make software secure – but it's no cure-all


Memory-safety flaws represent the majority of high-severity problems for Google and Microsoft, but they're not necessarily associated with the majority of vulnerabilities that actually get exploited.
So while coding with Rust can help reduce memory safety vulnerabilities, it won't fix everything.


https://www.theregister.com/2024/02/08/rust_software_memory_safety/
👍2
Please open Telegram to view this post
VIEW IN TELEGRAM
Urgent Security Alert! Hackers Hijacked Notepad++ Plugin
https://gbhackers.com/hackers-hijacked-notepad-plugin-to-execute-malicious-code/
👍4
#Tutorial

Real-world Android Malware Analysis


Part1 - Part2 - Part3 - Part4

تو این آموزش 4 قسمتی، نحوه تحلیل بدافزارهای اندروید رو با نمونه های واقعی یاد میگیرید

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
4🌭1🍌1💅1
325462-sdm-vol-1-2abcd-3abcd-4.pdf
23.2 MB
“Intel® 64 and IA-32 Architectures
Software Developer’s Manual
Combined Volumes:
1, 2A, 2B, 2C, 2D, 3A, 3B, 3C, 3D, and 4”



Intel manual
🤯2🔥1😱1