GitHub comments abused to push malware via Microsoft repo URLs
https://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-malware-via-microsoft-repo-urls/
https://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-malware-via-microsoft-repo-urls/
👍3
Red Team Manual- The Cheat Sheet (version 4).pdf
385.4 KB
A collection of all my personal cheat sheets and guides as I progress through my career in offensive security.
Red team RTO 1(Cobalt strike)
Red Team Operations (RTO) II
Red team RTO 1(Cobalt strike)
Red Team Operations (RTO) II
👍3
share some useful archives about vm and qemu escape exploit.
https://github.com/WinMin/awesome-vm-exploit
https://github.com/WinMin/awesome-vm-exploit
👍3
A collection of links related to VMware escape exploits by year
https://github.com/xairy/vmware-exploitation
https://github.com/xairy/vmware-exploitation
👍3
awesome-cyber-security-university
https://brootware.github.io/awesome-cyber-security-university/
🎓 Because Education should be free. Contributions welcome! 🕵️
https://brootware.github.io/awesome-cyber-security-university/
👍2
hasherezade 1001 nights(how Start?)
https://hshrzd.wordpress.com/how-to-start/
https://hshrzd.wordpress.com/how-to-start/
Many people approach me asking more or less the same questions: how to start RE, how to become a malware analyst, how did I start, what materials I can recommend, etc. So, in this section I will collect some hints and useful links for the beginners.
❤2👍1
Iczelion's tutorial Series
Win32 Assembly and VxD Tutorials
https://web.archive.org/web/20171110201344/http://win32assembly.programminghorizon.com/tutorials.html
Win32 Assembly and VxD Tutorials
https://web.archive.org/web/20171110201344/http://win32assembly.programminghorizon.com/tutorials.html
👍2❤1
Series of VMProtect 2 analysis:
🛡VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture
🎩GitHub
🛡VMProtect 2 - Part Two, Complete Static Analysis
#vmprotect #vmp
🛡VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture
🎩GitHub
🛡VMProtect 2 - Part Two, Complete Static Analysis
#vmprotect #vmp
👏3
👏2
Forwarded from Cybred
Рансомварщики HelloKitty опубликовали пароли к архивам с исходниками игр Ведьмак 3 (включая next-gen версию), Гвинт, и Thronebreaker: The Witcher Tales.
Magnet:
w3:
gwent:
w3rtx:
thronebreaker:
Magnet:
magnet:?xt=urn:btih:44134e7ade0f85e0ee940c33a7bfed5204587b93&dn=funnytorrent&tr=udp://tracker.openbittorrent.com:80&tr=udp://tracker.opentrackr.org:1337/announcew3:
oJX&S5678536Y8as%23gwent:
GyrS^&4A89x,w3rtx:
NIh\\*AS^8x0Xppwthronebreaker:
AN87*-2047UIOSh78^X❤4
Audio
Someone used AI to make Lockbit ransomware groups statement regarding the FBI takedown ... into an anime-like EDM ..
https://news.1rj.ru/str/vxunderground/3996
https://news.1rj.ru/str/vxunderground/3996
🥰2😁2
Forwarded from OnHex
🔴 اسلاید های کنفرانس Black Hat Asia 2024 که 16 تا 19 آوریل/28 تا 31 فروردین در سنگاپور برگزار شد ، در دسترسه که میتونید از گیتهابمون بصورت تکی یا یکجا (Releases) دانلود کنید.
#Conference #BHASIA #blackhat
🆔 @onhex_ir
➡️ ALL Link
#Conference #BHASIA #blackhat
🆔 @onhex_ir
➡️ ALL Link
GitHub
GitHub - onhexgroup/Conferences: Conference presentation slides
Conference presentation slides. Contribute to onhexgroup/Conferences development by creating an account on GitHub.
👍2
Forwarded from Source Chat (GOJO)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from R
(APT-Q-31) A memory loader Cobalt Strike written by Rust
English :
https://www-ctfiot-com.translate.goog/175132.html?_x_tr_sl=fa&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp
Tutorial [Cobalt Strike Shellcode Loader With Rust] :
https://www.youtube.com/watch?v=XfUTpwZKCDU
A COFF loader made in Rust :
https://github.com/hakaioffsec/coffee
English :
https://www-ctfiot-com.translate.goog/175132.html?_x_tr_sl=fa&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp
Tutorial [Cobalt Strike Shellcode Loader With Rust] :
https://www.youtube.com/watch?v=XfUTpwZKCDU
A COFF loader made in Rust :
https://github.com/hakaioffsec/coffee
CTF导航
海莲花(APT-Q-31)组织数字武器Rust加载器技术分析 | CTF导航
团伙背景海莲花,又名OceanLotus、APT32,奇安信内部跟踪编号APT-Q-31,是由奇安信威胁情报中心最早披露并命名的一个APT组织。自2012年4月起,海莲花针对中国政府、科研院所、海事机构、海域建设、航运企业等相关...
👍5
Windows Phantom DLL Hijacking: New Contribution to Hijack Execution Flow – DLL Search Order Hijacking
https://interpressecurity.com/resources/windows-phantom-dll-hijacking/
DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse
#dll_hijacking
https://interpressecurity.com/resources/windows-phantom-dll-hijacking/
DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse
#dll_hijacking
🔥2
Forwarded from CyberSecurityTechnologies (-CST-)
viper.pdf
4.5 MB
#exploit
"One Flip is All It Takes:
Identifying Syscall-Guard Variables for Data-Only Attacks", 2024.
]-> https://github.com/psu-security-universe/viper
]-> https://github.com/PSU-Security-Universe/data-only-attacks
"One Flip is All It Takes:
Identifying Syscall-Guard Variables for Data-Only Attacks", 2024.
]-> https://github.com/psu-security-universe/viper
]-> https://github.com/PSU-Security-Universe/data-only-attacks
🔥3
Project that generates Malicious Office Macro Enabled Dropper for DLL SideLoading and Embed it in Lnk file to bypass MOTW
[ GITHUB ]
#DLL_SideLoading
#Dropper #Lnk
[ GITHUB ]
#DLL_SideLoading
#Dropper #Lnk
🔥4❤1