Source Byte – Telegram
Source Byte
7.76K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Source Byte
"Windows Address Translation Deep Dive – Part 1" First of all, we need to go back to the past – the 16-bit era – and take a look at memory segmentation. A feature which still exists today on modern processors but is thankfully ignored on x64 processors when…
" Windows Address Translation Deep Dive – Part 2 "
In the first part of this post series, we looked at how segmentation worked and how a virtual address (linear address) was constructed. This part we will exploring how our linear address is translated by the memory management unit (MMU) to a physical address and the structures which Windows uses to manage this process.

https://bsodtutorials.wordpress.com/2024/04/05/windows-address-translation-deep-dive-part-2/
👍4
👍4
👍3👏1
Beginner guide to game hacking (Guidedhacking)
Link
👍41🔥1
How to Unpack VMProtect Tutorial - no virtualization
Link
👍31
🤣23🔥2
A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust

https://github.com/Karkas66/CelestialSpark
🔥3👍1
👍2🔥1
Forwarded from PT SWARM
🏭 We've tested the new RCE in Microsoft Outlook (CVE-2024-21378) in a production environment and confirm it works well!

A brief instruction for red teams:

1. Compile our enhanced DLL;
2. Use NetSPI's ruler and wait!

No back connect required!

🔥 📐📏
5🔥2👍1
many asks about VMProtect situation , so i decide to share
RE504 from OALabs
context :
01 - How To Unpack VMProtect Malware - Part 1
02 - How To Unpack VMProtect Malware - Part 2
03 - How To Unpack VMProtect Malware - Part 3
04 - How To Unpack VMProtect 3 (x64) Night Sky Ransomware (final)
👍81
RE504.7z
637.1 MB
Pass :
@islemolecule_source
👍7🔥43
Forwarded from Proxy Bar
CVE-2024-21378 Microsoft Outlook Remote Code Execution
*
Описание работы внутри файла
*
POC exploit

#outlook #exploit
👍4👎1
🤔6🤣1
obfus.h is a macro-only library for compile-time obfuscating C applications, designed specifically for the Tiny C (tcc). It is tailored for Windows x86 and x64 platforms and supports all versions of the compiler.

https://github.com/DosX-dev/obfus.h
7👍3🔥1
CodeMachine Kernel Rootkits.zip.001
1.9 GB
🔥5👍2
CodeMachine Kernel Rootkits.zip.002
1.9 GB
🔥5👍2
CodeMachine Kernel Rootkits.zip.003
1.9 GB
🔥5👍2
CodeMachine Kernel Rootkits.zip.004
1.9 GB
🔥5👍2
CodeMachine Kernel Rootkits.zip.005
1.9 GB
🔥51👍1