Source Byte – Telegram
Source Byte
7.76K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Malware Analysis and Incident Response/forensic

https://ashemery.github.io/malware-tools/
👍7
👍61
🔥5
Source Byte pinned «Understanding Processor Architectures: CISC vs RISC https://pcsite.co.uk/understanding-processor-architectures-cisc-vs-risc/?feed_id=15806»
Understanding_a_Payloads_Life.pdf
4.7 MB
Understanding a Payload's Life


Agenda
1. Needing an Advanced Payload
2. About Terminology
3. Payload Generation
4. Payload Executables
5. Payload Staging
6. Reflective Loading
👍9
VR of Android apps_ from 0 to 0-day using fuzzing (1).pdf
659 KB
VR of Android apps: from 0 to 0-day using fuzzing

Speaker: @dura_lex
👍8
Simulate the behavior of AV/EDR for malware development training

https://github.com/Helixo32/CrimsonEDR
5👍3
HackTheBoxPDF by Tamarisk.zip
1 GB
500HTB-Tamarisk
👍2🔥2
GAME-HACKING.zip
4.8 MB
🤯4❤‍🔥2👍2🤩2😱1
Windows admin to kernel

LPE from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.
https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
👍4🔥2🤡2
👍3🔥2
Anything you want you can search and ippsec show how
https://ippsec.rocks/?#
👍2🔥2
A tool that send TCP/UDP traffic over ICMP that written in go

https://github.com/esrrhs/pingtunnel
👍3🔥2🥱1
Forwarded from Source Chat (GOJO)
Please open Telegram to view this post
VIEW IN TELEGRAM
Keylogging in the Windows kernel with undocumented data structures
https://eversinc33.com/posts/kernel-mode-keylogging/
👍2🔥2
A technique of hiding malicious shellcode via Shannon encoding.
https://github.com/kleiton0x00/Shelltropy.git
👍2🔥2
Little AV/EDR bypassing lab for training & learning purposes

https://github.com/Xacone/BestEdrOfTheMarket
👍2🔥2
superman
Kill The Protected Process
https://github.com/b1-team/superman
🔥5👍2
Name: Serious Cryptography
Requirements: Nothing
Level: Basics and Basis
Author: Jean-Phillippe Aumassen

Chapters:
1 - Encryption
2 - Randomness
3 - Cryptography Security
4 - Block Ciphers
5 - Stream Ciphers
6 - Hash Functions
7 - Keyed Hashing
8 - Authenticated Encryption
9 - Hard Problems
10 - RSA
11 - Diffie-Hellman
12 - Elliptic Curves
13 - TLS
14 - Quantum and Post-Quantom”
👍3
Serious_Cryptography_A_Practical.pdf
5.2 MB
🔥3👍2