Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Forwarded from 1N73LL1G3NC3
SymProcAddress

Zero EAT touch way to retrieve function addresses (GetProcAddress on steroids)

https://github.com/MzHmO/SymProcAddress
👍5
Forwarded from APT
⚙️ MultiDump

This is a post-exploitation tool written in C for dumping and extracting LSASS memory discreetly. MultiDump supports LSASS dump via ProcDump.exe or Comsvc.dll, it offers two modes: a local mode that encrypts and stores the dump file locally, and a remote mode that sends the dump to a handler for decryption and analysis

🔗 https://github.com/Xre0uS/MultiDump

#lsass #remote #cpp #python
👍5🥰1
#Source

D/Invoke Process Hollowing

Implementation of process hollowing shellcode injection using DInvoke.

با استفاده از Dynamic Invocation یا همون D/Invoke به جای P/Invoke میتونید به صورت داینامیک از کد های UnManaged استفاده کنید.

تو این مقاله به صورت کامل در مورد ضرورت ایجاد D/Invoke و تفاوتش با P/Invoke اشاره کرده.

حالا در این ریپو یک سناریو مربوط به تزریق کد ها با استفاده از تکنیک Process Hollowing رو میتونید بررسی کنید.

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6🔥21🌭1🍌1💅1
👍5
Forwarded from vx-underground
13-year-old Marco Liberale has created a proof-of-concept PasteBin C2 botnet in Go. Is it fully cross platform working on Windows, Linux, and Mac.

We are very happy to see such a young person contributing to this research space.

Check it out here: https://github.com/marco-liberale/PasteBomb
🔥81
👍2
A set of tools for remote password dumping.
https://github.com/Slowerzs/ThievingFox/

And the blog itself: https://blog.slowerzs.net/posts/thievingfox/
3👍2
2🔥2
Abusing Windows Implementation of Fork() for Stealthy Memory Operations

https://billdemirkapi.me/abusing-windows-implementation-of-fork-for-stealthy-memory-operations/


A POC for the new injection technique, abusing windows fork API to evade EDRs.
Blackhat

https://github.com/deepinstinct/Dirty-Vanity
4
Originally, a port of the Dirty Vanity project to fork and dump the LSASS process. Has been updated upon further research to attempt to duplicate open handles to LSASS.

If this fails (and it likely will), it will attempt to obtain a handle to LSASS through the NtGetNextProcess function instead of OpenProcess/NtOpenProcess.

https://github.com/RePRGM/Nimperiments/tree/main/EvilLsassTwin
3
Dirty_Vanity.pdf
2.3 MB
BlackHat Europe 2022:
"Dirty Vanity: A New Approach to Code injection & EDR bypass".
👍4
Forwarded from Source Chat (GOJO)
Please open Telegram to view this post
VIEW IN TELEGRAM
Malware Exhibit (Malware samples in any language)

https://github.com/alvin-tosh/Malware-Exhibit
3
malware_development_for_dummies_Jake_Adelson.pdf
2.3 MB
malware_development_for_dummies_Jake_Adelson.pdf

Twitter: @_gui3_
GitHub: 5yn
👍4
👍3
Red Team Manual- The Cheat Sheet (version 4).pdf
385.4 KB
A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.
Red team RTO 1(Cobalt strike)

Red Team Operations (RTO) II
👍3