Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
RIFT: Analysing a Lazarus Shellcode Execution Method NCC Group Research

This post covers a shellcode execution technique that leverages the UuidFromStringA and EnumSystemLocalA APIs to load and execute shellcode

Shellcode Execution via EnumSystemLocalA
https://blog.securehat.co.uk/process-injection/shellcode-execution-via-enumsystemlocala

[ Ref ]
🔥41
Please open Telegram to view this post
VIEW IN TELEGRAM
📍Malware that TeamTNT found and removed.
[ GitHub ]


📍Awesome red team toolkits
[ GitHub ]
🔥4👍11
Zloader has reintroduced an anti-analysis feature similar to one that was present in the original ZeuS 2.x code. The feature restricts Zloader’s binary execution to the infected machine.
[ zscaler ]

[+] Technical analysis


#malware_analysis
4👍1🔥1
Source Byte
BlackHat - Android UserLand Fuzzing and Exploitation Full Course https://news.1rj.ru/str/boost/Source_byte
Thanks for your boosts❤️
62👍1
In-Depth Red Teaming: APT & Adversary Simulation
Link



[Maltrak Malware Analysis Mindset]
112👍1
Source Byte
Part 7 is up! Continuing with PE parsing we'll also explore easy ways to parse attributes and the various flags that Windows uses specific to PE files Register here: https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-7/?utm_medium=Social&utm…
An Intro to C for Windows - Part 8
Threads, stacks, and heaps! Part 8 will take a look at using Windows APIs to create threads, heaps, and using a debugger to view stacks. We will also talk about some of the myths around stack growth versus stack usage.


https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-8/
credit : Jonathan Reiter
5👍1
Forwarded from white2hack 📚
Designing Secure Software: A Guide for Developers, Loren Kohnfelder, 2021

The book begins with a discussion of core concepts like trust, threats, mitigation, secure design patterns, and cryptography.

The second part, perhaps this book’s most unique and important contribution to the field, covers the process of designing and reviewing a software design with security considerations in mind.

The final section details the most common coding flaws that create vulnerabilities, making copious use of code snippets written in C and Python to illustrate implementation vulnerabilities.

Official page

#book #coding #Python
👍1
Forwarded from white2hack 📚
Designing_Secure_Software_A_Guide_for_Developers_2021.pdf
9.2 MB
Designing Secure Software: A Guide for Developers , Loren Kohnfelder, 2021
6👍1
Bypassing UAC in the most Complex Way Possible!
[ Tranids ]

#windows
#uac
5👍1
Dumping Stored Credentials with SeTrustedCredmanAccessPrivilege
[ Dump creds ]

#windows
#malware_dev
#creds
5👍1
A Trip Down Memory Lane
Antivirus evasion has quickly become one of the most overwritten topics, with endless articles on writing shellcode loaders and other evasive stageless droppers.

https://gatari.dev/posts/a-trip-down-memory-lane/
credit : @gatariee

#AV , #red_team
3👍1
5👍2
book.pdf
8.7 MB
https://toc.cryptobook.us/book.pdf

A Graduate Course in
Applied Cryptography
By Dan Boneh and Victor Shoup


#book
#cryptography
4👍1
This is a repository with sample malduck🦆 config extraction modules. By utilizing them you should be able to extract embedded configuration from unpacked malware samples of: njrat, remcos, revil, graphicalproton

[ GitHub ]

#malware_analysis
32👍1
Native code virtualizer for x64 binaries
[ GitHub ]

#reverse
5🤷‍♀21
Experimental Windows x64 Kernel Rootkit.

[ GitHub ]

#windows
#malware_dev
5👍1