Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Windows Phantom DLL Hijacking: New Contribution to Hijack Execution Flow – DLL Search Order Hijacking
https://interpressecurity.com/resources/windows-phantom-dll-hijacking/


DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse


#dll_hijacking
🔥2
Forwarded from CyberSecurityTechnologies (-CST-)
viper.pdf
4.5 MB
#exploit
"One Flip is All It Takes:
Identifying Syscall-Guard Variables for Data-Only Attacks", 2024.
]-> https://github.com/psu-security-universe/viper
]-> https://github.com/PSU-Security-Universe/data-only-attacks
🔥3
Project that generates Malicious Office Macro Enabled Dropper for DLL SideLoading and Embed it in Lnk file to bypass MOTW
[ GITHUB ]

#DLL_SideLoading
#Dropper #Lnk
🔥41
Refresh AD Groups Membership without Reboot/Logoff

Purge the computer account kerberos tickets with:
klist -lh 0 -li 0x3e7 purge


Reload User Groups Membership without Logging Off with:
klist purge

[Twitter]

#AD
2👏1
Windows Device drivers internals and some reversing

[ Off by security ]

#internals
👍31
Forwarded from SoheilSec (Soheil Hashemi)
👍2🔥2
" The Open Source Problem "
you have software on your machine right now that is running code from one of many similar "suspicious" accounts.


https://cybersecpolitics.blogspot.com/2024/04/the-open-source-problem.html

#CVE-2024-3094
5👎4👍1
WPE.pdf
5 MB
"Windows Privilege Escalation", 2024.


VX_UNDERGROUND

#windows_priv
#windows
6
כאן חדשות

נערת הפיתוי האיראנית: נהג משאית צבאי תיעד, לפי החשד, עשרות סוללות כיפת ברזל במהלך נסיעותיו בתפקיד, ושלח תמונות ומיקומים שלהן בפייסבוק לגורם איראני שהתחזה לאישה

#חדשותהע

https://twitter.com/kann_news/status/1783218563177742831

#social_Engineering
🤣13🤔3
Reverse engineering cpp - Gal Zaban
[ YouTube ]

Everything you Ever wanted to know about dlls
[ YouTube ]


#conference
#cpp
#windows
🔥3
updated : part 18 added

ETW-ByeBye: Disabling ETW-TI Without PPL
2
This media is not supported in your browser
VIEW IN TELEGRAM
you can upload any file as an attachment in a draft comment on any public GitHub repo, delete the comment but the file download URL remains active, and the repo owner can’t do anything about it
🤩11😁2
The Nightmare of EDR: Storm-0978 Utilizing New Kernel Injection Technique "Step Bear"


https://ti.qianxin.com/blog/articles/The-Nightmare-of-EDR-Storm-0978-Utilizing-New-Kernel-Injection-Technique-Step-Bear-EN/
4🐳1
Forwarded from Hide01
I have no problem. my point is not to make money out of the website. If its earned enough to keep servers running that be enough for me. if something leaks out then its for everyone use it and i will not be sad for a single second. Enjoy the material
14🐳1
https://news.1rj.ru/str/Hide01


My Website: Hide01.ir

Telegram Contact: t.me/Hide01Bot

Email: root@hide01.ir

PGP: pgp.hide01.ir

Jabber: hide01@jabber.calyxinstitute.org

Twitter: twitter.com/H1deZeroOne

Persian Donate: idpay.ir/hide01
🔥8
A Deep Dive into V8 Sandbox Escape Technique Used in In-The-Wild Exploit
We were analyzing an in-the-wild V8 vulnerability, CVE-2023–2033. Once we exploited the bug, it was not difficult to get typical exploit primitives such as addrof, read and write in V8 heap. The problem is that we need to escape the V8 sandbox in order to get code execution.

https://blog.theori.io/a-deep-dive-into-v8-sandbox-escape-technique-used-in-in-the-wild-exploit-d5dcf30681d4

# CVE-2023–2033 , #cve_analysis
👍7
Asia_24_Yair_magicdot_a_hackers_magic_show_of_disappearing_dots.pdf
3.8 MB
Asia-24-Yair-magicdot-a-hackers-magic-show-of-disappearing-dots-and-spaces.pdf
👍3
Source Byte
Asia_24_Yair_magicdot_a_hackers_magic_show_of_disappearing_dots.pdf
👍5