Source Byte – Telegram
Source Byte
7.76K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
A tool that send TCP/UDP traffic over ICMP that written in go

https://github.com/esrrhs/pingtunnel
👍3🔥2🥱1
Forwarded from Source Chat (GOJO)
Please open Telegram to view this post
VIEW IN TELEGRAM
Keylogging in the Windows kernel with undocumented data structures
https://eversinc33.com/posts/kernel-mode-keylogging/
👍2🔥2
A technique of hiding malicious shellcode via Shannon encoding.
https://github.com/kleiton0x00/Shelltropy.git
👍2🔥2
Little AV/EDR bypassing lab for training & learning purposes

https://github.com/Xacone/BestEdrOfTheMarket
👍2🔥2
superman
Kill The Protected Process
https://github.com/b1-team/superman
🔥5👍2
Name: Serious Cryptography
Requirements: Nothing
Level: Basics and Basis
Author: Jean-Phillippe Aumassen

Chapters:
1 - Encryption
2 - Randomness
3 - Cryptography Security
4 - Block Ciphers
5 - Stream Ciphers
6 - Hash Functions
7 - Keyed Hashing
8 - Authenticated Encryption
9 - Hard Problems
10 - RSA
11 - Diffie-Hellman
12 - Elliptic Curves
13 - TLS
14 - Quantum and Post-Quantom”
👍3
Serious_Cryptography_A_Practical.pdf
5.2 MB
🔥3👍2
Vulnerability Management Goes Much Deeper Than Patching

What Is Vulnerability Management?
Vulnerability Management For Compliance
Elements of Vulnerability Management
Improving Vulnerability Management With Zero Trust
Vulnerability Management Is a Journey, Not a Destination


https://www.kolide.com/blog/vulnerability-management-goes-much-deeper-than-patching
5👍2
7👍1
Windows-based credential dumper using C++ and MASM x64.
https://github.com/Meowmycks/LetMeowIn
👍7
Forwarded from white2hack 📚
Notes ver.1.0 Stuff about IT security that might be good to know by xapax

This is some documentation I have build up over the years. Everything is work in progress, some stuff is years old and might not be relevant. Other stuff is new and not so bad.

Source
GitHub

#useful #defensive #web #hardening
5
Forwarded from Offensive Xwitter
😈 [ Evan McBroom @mcbroom_evan ]

I just published a blog and tool for the LSA Whisperer work that was presented at the SpecterOps Conference (SOCON) back in March.

If you are interested in getting credentials from LSASS without accessing its memory, check it out!

Blog:
🔗 https://medium.com/specter-ops-posts/lsa-whisperer-20874277ea3b

Tool:
🔗 https://github.com/Meowmycks/LetMeowIn

Crossposted on GH:
🔗 https://gist.github.com/EvanMcBroom/dceb1c7070ee3278eaedd04b42aed279

🐥 [ tweet ]
👍4
Forwarded from 1N73LL1G3NC3
SymProcAddress

Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)

https://github.com/MzHmO/SymProcAddress
👍5
Forwarded from APT
⚙️ MultiDump

This is a post-exploitation tool written in C for dumping and extracting LSASS memory discreetly. MultiDump supports LSASS dump via ProcDump.exe or Comsvc.dll, it offers two modes: a local mode that encrypts and stores the dump file locally, and a remote mode that sends the dump to a handler for decryption and analysis

🔗 https://github.com/Xre0uS/MultiDump

#lsass #remote #cpp #python
👍5🥰1
#Source

D/Invoke Process Hollowing

Implementation of process hollowing shellcode injection using DInvoke.

با استفاده از Dynamic Invocation یا همون D/Invoke به جای P/Invoke میتونید به صورت داینامیک از کد های UnManaged استفاده کنید.

تو این مقاله به صورت کامل در مورد ضرورت ایجاد D/Invoke و تفاوتش با P/Invoke اشاره کرده.

حالا در این ریپو یک سناریو مربوط به تزریق کد ها با استفاده از تکنیک Process Hollowing رو میتونید بررسی کنید.

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6🔥21🌭1🍌1💅1
👍5
Forwarded from vx-underground
13-year-old Marco Liberale has created a proof-of-concept PasteBin C2 botnet in Go. Is it fully cross platform working on Windows, Linux, and Mac.

We are very happy to see such a young person contributing to this research space.

Check it out here: https://github.com/marco-liberale/PasteBomb
🔥81