Forwarded from Soxoj insides
Top SOCMINT tools to investigate and to deanonymize GitHub accounts:
- GitFive from mxrch
- Octosuite from rly0heart (Bellingcat)
- Gitcolombo from soxoj
- Zen from s0md3v
- Map of GitHub from anvaka
- Dorks and secret search for cybersec
👉 Read more: https://sowel.soxoj.com/check-commits
#github #community
- GitFive from mxrch
- Octosuite from rly0heart (Bellingcat)
- Gitcolombo from soxoj
- Zen from s0md3v
- Map of GitHub from anvaka
- Dorks and secret search for cybersec
👉 Read more: https://sowel.soxoj.com/check-commits
#github #community
❤5
Trace processing pipeline
https://github.com/SeanHeelan/otel-profiling-agent/blob/main/README.md#trace-processing-pipeline
https://github.com/SeanHeelan/otel-profiling-agent/blob/main/README.md#trace-processing-pipeline
👍7
Forwarded from CyberSecurityTechnologies (-CST-)
#exploit
1. Windows 11 24H2 NT Exploit
https://github.com/exploits-forsale/24h2-nt-exploit
2. CVE-2024-29417:
Unauth privilege escalation in Horacius
https://blog.pridesec.com.br/en/horacius-unauthenticated-privilege-escalation
1. Windows 11 24H2 NT Exploit
https://github.com/exploits-forsale/24h2-nt-exploit
2. CVE-2024-29417:
Unauth privilege escalation in Horacius
https://blog.pridesec.com.br/en/horacius-unauthenticated-privilege-escalation
👍3 2
System Programming Roadmap
https://github.com/ujjwal-kr/system-programming-roadmap
System Programming Languages
Computer Architecture
Assembly
Compilers
Exploitation
Browser Hacking
Malware
OS Fundamentals
VM internals
https://github.com/ujjwal-kr/system-programming-roadmap
🔥7👍1
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
https://github.com/crocodyli/ThreatActors-TTPs.git
https://github.com/crocodyli/ThreatActors-TTPs.git
🔥4👍1 1
RIFT: Analysing a Lazarus Shellcode Execution Method NCC Group Research
Shellcode Execution via EnumSystemLocalA
https://blog.securehat.co.uk/process-injection/shellcode-execution-via-enumsystemlocala
[ Ref ]
This post covers a shellcode execution technique that leverages the UuidFromStringA and EnumSystemLocalA APIs to load and execute shellcode
Shellcode Execution via EnumSystemLocalA
https://blog.securehat.co.uk/process-injection/shellcode-execution-via-enumsystemlocala
[ Ref ]
🔥4 1
🔥4👍1 1
Zloader has reintroduced an anti-analysis feature similar to one that was present in the original ZeuS 2.x code. The feature restricts Zloader’s binary execution to the infected machine.
[ zscaler ]
[+] Technical analysis
#malware_analysis
[ zscaler ]
[+] Technical analysis
#malware_analysis
Source Byte
BlackHat - Android UserLand Fuzzing and Exploitation Full Course https://news.1rj.ru/str/boost/Source_byte
Thanks for your boosts❤️
❤6 2👍1
Source Byte
Part 7 is up! Continuing with PE parsing we'll also explore easy ways to parse attributes and the various flags that Windows uses specific to PE files Register here: https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-7/?utm_medium=Social&utm…
An Intro to C for Windows - Part 8
https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-8/
credit : Jonathan Reiter
Threads, stacks, and heaps! Part 8 will take a look at using Windows APIs to create threads, heaps, and using a debugger to view stacks. We will also talk about some of the myths around stack growth versus stack usage.
https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-8/
credit : Jonathan Reiter
Forwarded from white2hack 📚
Designing Secure Software: A Guide for Developers, Loren Kohnfelder, 2021
The book begins with a discussion of core concepts like trust, threats, mitigation, secure design patterns, and cryptography.
The second part, perhaps this book’s most unique and important contribution to the field, covers the process of designing and reviewing a software design with security considerations in mind.
The final section details the most common coding flaws that create vulnerabilities, making copious use of code snippets written in C and Python to illustrate implementation vulnerabilities.
Official page
#book #coding #Python
The book begins with a discussion of core concepts like trust, threats, mitigation, secure design patterns, and cryptography.
The second part, perhaps this book’s most unique and important contribution to the field, covers the process of designing and reviewing a software design with security considerations in mind.
The final section details the most common coding flaws that create vulnerabilities, making copious use of code snippets written in C and Python to illustrate implementation vulnerabilities.
Official page
#book #coding #Python
👍1
Forwarded from white2hack 📚
Designing_Secure_Software_A_Guide_for_Developers_2021.pdf
9.2 MB
Designing Secure Software: A Guide for Developers , Loren Kohnfelder, 2021