Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Abusing Windows Implementation of Fork() for Stealthy Memory Operations

https://billdemirkapi.me/abusing-windows-implementation-of-fork-for-stealthy-memory-operations/


A POC for the new injection technique, abusing windows fork API to evade EDRs.
Blackhat

https://github.com/deepinstinct/Dirty-Vanity
4
Originally, a port of the Dirty Vanity project to fork and dump the LSASS process. Has been updated upon further research to attempt to duplicate open handles to LSASS.

If this fails (and it likely will), it will attempt to obtain a handle to LSASS through the NtGetNextProcess function instead of OpenProcess/NtOpenProcess.

https://github.com/RePRGM/Nimperiments/tree/main/EvilLsassTwin
3
Dirty_Vanity.pdf
2.3 MB
BlackHat Europe 2022:
"Dirty Vanity: A New Approach to Code injection & EDR bypass".
👍4
Forwarded from Source Chat (GOJO)
Please open Telegram to view this post
VIEW IN TELEGRAM
Malware Exhibit (Malware samples in any language)

https://github.com/alvin-tosh/Malware-Exhibit
3
malware_development_for_dummies_Jake_Adelson.pdf
2.3 MB
malware_development_for_dummies_Jake_Adelson.pdf

Twitter: @_gui3_
GitHub: 5yn
👍4
👍3
Red Team Manual- The Cheat Sheet (version 4).pdf
385.4 KB
A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.
Red team RTO 1(Cobalt strike)

Red Team Operations (RTO) II
👍3
share some useful archives about vm and qemu escape exploit.
https://github.com/WinMin/awesome-vm-exploit
👍3
A collection of links related to VMware escape exploits by year
https://github.com/xairy/vmware-exploitation
👍3
awesome-cyber-security-university
🎓 Because Education should be free. Contributions welcome! 🕵️

https://brootware.github.io/awesome-cyber-security-university/
👍2
hasherezade 1001 nights(how Start?)
https://hshrzd.wordpress.com/how-to-start/

Many people approach me asking more or less the same questions: how to start RE, how to become a malware analyst, how did I start, what materials I can recommend, etc. So, in this section I will collect some hints and useful links for the beginners.
2👍1
👍21
AI-powered search engine with a generative UI.
http://www.morphic.sh

#ai
👍4
Source Byte pinned a photo
👏3
How To Unpack VMProtect 3 (X64) Night Sky Ransomware (Patreon)
Link

#vmprotect #vmp
👏2
Forwarded from Cybred
Рансомварщики HelloKitty опубликовали пароли к архивам с исходниками игр Ведьмак 3 (включая next-gen версию), Гвинт, и Thronebreaker: The Witcher Tales.

Magnet: magnet:?xt=urn:btih:44134e7ade0f85e0ee940c33a7bfed5204587b93&dn=funnytorrent&tr=udp://tracker.openbittorrent.com:80&tr=udp://tracker.opentrackr.org:1337/announce

w3: oJX&S5678536Y8as%23
gwent: GyrS^&4A89x,
w3rtx: NIh\\*AS^8x0Xppw
thronebreaker: AN87*-2047UIOSh78^X
4
Audio
Someone used AI to make Lockbit ransomware groups statement regarding the FBI takedown ... into an anime-like EDM ..


https://news.1rj.ru/str/vxunderground/3996
🥰2😁2
pestudio-pro_9.57.7z
825 KB
pestudio pro 9.57
🔥7