Source Byte – Telegram
Source Byte
7.74K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Today is girls day in Iran .

Happy girls' day to all women subscribers :)
❤‍🔥13🍾3🐳1
us-14-Mesbahi-One-Packer-To-Rule-Them-All-WP.pdf
2.4 MB
#Blackhat
us-14-Mesbahi-One-Packer-To-Rule-Them-All-WP

#packer #reverse
👍3🥰2🔥1
Forwarded from Stuff for Geeks (rBHm)
یه دوره‌ای مهندس کاظمی عزیز معرفی کردن بهم که میاد از صفر یه بوت لودر و کرنل و عملا سیستم عامل مینویسه و میره جلو

واقعا جذابه دورش بنظرم:
https://p30download.ir/fa/entry/96910/


#internals
#OS
#Programming
#course
🔥102👍1🙏1
Like a roadmap, but in the form of links and books (in the process of being added)


Links:
‾‾‾‾‾‾‾‾‾

The most clear explanation about memory, segments, broadcasts, etc. in Russian
acm.bsu.by/wiki/Unix2019b/Memory_organization_on_x86-64
acm.bsu.by/wiki/C2017/Architecture_x86-64
habr.com/ru/company/intel/blog/238091

Basic threads from Vasma about cracking, ideas and everything everything everything
wasm.in/blogs/category/issledovanie-programm.19
wasm.in/blogs/category/sekrety-win32.17
wasm.in/blogs/category/uroki-iczeliona.2
wasm.in/blogs/category/virusologija.25/
https://wasm.in/forums/wasm-nt-kernel.17/

Greatest Dr. Xiang Fu with tutorials on malware analysis
fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html

All about anti-debugging
anti-debug.checkpoint.com

Collection of must-read articles on reverse engineering from Hacker
xakep.ru/2017/10/18/reverse-malware-must-read
xakep.ru/2006/11/27/35410

Notes from Yosifovich on Windows jokes
scorpiosoftware.net/category/windows-internals

Manuals for crack prog
manhunter.ru/underground
reversing.do.am/load

Forensics research
dfir.ru

Raymond Chen's blog about Windows jokes
devblogs.microsoft.com/oldnewthing

A lot of useful information about windows system programming in Russian, including
kaimi.io
kaimi.io/tag/assembler
kaimi.io/2012/09/pe-packer-step-by-step-1

Reverse/PE/anti-analysis labs
malwareunicorn.org/#/workshops

Modern Malware Techniques
danusminimus.github.io

Labs for writing cheats for games
gamehacking.academy

An endless amount of reverse/malware content, search by changing the id in the URL
samsclass.info/126/proj/PMA1.htm
samsclass.info/126/proj/PMA2.htm

Repository of the Institute of Informatics of Poland, low-level prog, reverse
ics.p.lodz.pl/~dpuchala/LowLevelProgr

[windows] kernel internals
matteomalvica.com/minutes/windows_kernel

lena151's cracking tutorials
you can find on the Internet, sequential manuals for cracking prog, although essentially without explanation, made in the form of flash interactive pictures

Reverse course
https://0xinfection.github.io/reversing/

underground base heh
https://web.archive.org/web/20200519101558/https://krober.biz/?p=3413#more-3413

Books:
‾‾‾‾‾‾‾‾

What Makes It Page?: The Windows 7 (x64) Virtual Memory Manager - Enrico Martignetti

Reverse Engineering for Beginners - Denis Yurichev

Windows Kernel Programming (Working with the Windows kernel) - Pavel Yosifovich

Windows Internals Book 7th edition (Windows Internals) - Mark Russinovich

Windows 10 System Programming, Part 1 - Pavel Yosifovich

Windows 10 System Programming, Part 2 - Pavel Yosifovich

Troubleshooting with the Windows Sysinternals Tools - Mark Russinovich

Advanced Windows Debugging - Mario Hewardt

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software - Andrew Honig and Michael Sikorski

C++ programming technology. Win32 API applications - Nikolay Litvinenko
System programming in WINAPI - Yu.V. Marapulets

Programming for Windows 95 - Charles Petzold

Win32 API. Effective application development - Yuriy Shchupak

Windows for professionals. Building efficient WIN32 applications with 64-bit Windows in mind - Jeffrey Richter

Windows via C/C++. Programming in Visual C++ - Jeffrey Richter, Christophe Nazar

Windows System Programming - Hart Johnson

System programming in Window - Alexander Pobegailo

Microsoft Windows 3.1 operating system for a programmer - Alexander Frolov, Grigory Frolov https://www.frolov-lib.ru/

Graphics Programming for Windows - Fen Yuan

Using Microsoft Windows Driver Model - They Walter

Organization of input-output. Drivers WDM 2011 - Roshchin A.V.
👍8
Literally must do things aka reverse roadmap

reverse/low-level failure/cracking conference
https://youtube.com/@wasmio?si=MaOxUpFKkMuNrAoI

dr fu reverse notes
http://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html


anti-debug.checkpoint.com

SANS digital forensics courses
https://www.sans.org/cyber-security-skills-roadmap/

All related articles from the hacker
https://xakep.ru/2017/10/18/reverse-malware-must-read/

Notes on Kraks
https://www.manhunter.ru/underground/


Books:
Windows Internals - Pavel Yosifovich, David A. Solomon
Windows Kernel Programming - Pavel Yosifovich
11👍5
Art-of-Exploitation-Persian.pdf
1.7 MB
کتاب فارسی art of exploitation از Ceph به‌ زبان فارسی

https://x.com/c3ph

#pwn
14👍1
Source Byte pinned a file
11👍2👎2🥰2
Attacking Rust.pdf
1.9 MB
7👍1
x64_Assembly_Language_Step_by_Step_Programming_with_Linux_Tech_Today.pdf
13.8 MB
Year : 2024
Pages: 796 Edition:4th


Good channel @book_network_ir

#book
10🙏2👍1👎1🤔1
Forwarded from OnHex
🔴 رویداد Pwnie Award 2024

در این پست به معرفی رویداد Pwnie Award 2024 پرداختیم. شرایط شرکت در این رویداد و قوانین و بهترین های سال 2023 این رویداد رو بررسی کردیم. اگه علاقمند بودید شرکت کنید.

بخشی از این رویداد، انتخاب بهترین آهنگهای جامعه ی امنیت سایبری هستش، که از طریق پستهای زیر قابل دسترسه.

تعدادی از این موزیکها در یوتیوب منتشر شدن، که اونارو در یک لیست پخش جمع آوری کردم که اگه خواستید نمونه ببینید و ... ، میتونید از اینجا بهشون دسترسی داشته باشید.

#رویداد #آسیب_پذیری_امنیتی #توسعه_اکسپلویت

🆔 @onhex_ir
➡️ ALL Link
👍3
C2 communication:
using MS Windows printers for persistence/C2 via Internet Printing
[+]GitHub

PingRAT - Secretly Passes C2 Traffic Through Firewalls Using ICMP Payloads
[+]GitHub

Discord as C2 traffic broker
[+]YouTube

Secret Handshake A Mutual TLS Based C2 Communication
[+]YouTube

Building a DNS C2 Framework from scratch
[+] Blog


-_-_-_-_-_-_-_-_-_-_-_-__-_-_-_-_-_-_-_-_-_-_-_-_
Example of cnc traffics for blue teammers
[+]GitHub


#C2
🔥5👍1
Rootkit resources:

creating a Rootkit to Learn C
[+]‌‌ GitHub
Windows Bootkits Guide
[+] blog
Experimental Windows x64 Kernel Rootkit
[+] GitHub
windows rootkit dev series
[+] GitHub
Organized list of my malware development resources
[+] GitHub
implementation examples of basic rootkit functionality and the basics of kernel driver development
[+] GitHub
Windows rootkit development for red teaming series
[+] Link


CodeMachine - Windows Kernel Rootkit Techniques
[+] Course
The rootkit arsenal 📚
[+] book
Exploits and rootkits in your browser extensions DEFCON 2021


#rootkit
👍13🔥3🗿2
Call of Duty: Black Ops 3 runtime code integrity protection Reverse engineering

credits : Maurice Heumann

https://web.archive.org/web/20230522230748/https://momo5502.com/posts/2022-11-17-reverse-engineering-integrity-checks-in-black-ops-3/


may be usefull for baba panjali :p

#game
👍7😁6
exploit.education provides a variety of resources that can be used to learn about vulnerability analysis, exploit development, software debugging, binary analysis, and general cyber security issues.



#exploit_dev ,
👍4🔥2
🖥 دانلود رایگان دوره دوم مهندسی معکوس نرم افزار | آکادمی DWORD

⭕️ در حال حاضر آخرین نگارش
دوره مهندسی معکوس نرم افزار ، نگارش پنجم میباشد که بیش از 70 ساعت تدریس شده و سرفصلها تماما بروزرسانی گردیده.

سال برگزاری دوره دوم : 2021
مدت زمان : 41 ساعت
حجم : 8G
برگزار کننده : آکادمی DWORD - یاشار محمودنیا

🔽دانلود سرفصل ها | دانلود لینک های دوره

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
14🤬3👍1👎1😡1
Media is too big
VIEW IN TELEGRAM
⭕️تحلیل و بررسی ادعاهای کلاهبردار "اهواز هکرز" و آکادمی های همکارشون درمورد اینکه چرا پشت سر آقای محمودنیا صحبت میکردن و ایشون رو کلاهبردار خطاب میکردند.
این ویدیو را با صدای مهندس محمودنیا از آکادمیDWORD تماشا کنید.


امیدواریم جامعه امنیت از مدرس های خوب کشورمون حمایت کند تا موجب دلگرمی و پیشرفت همه افراد این حوزه شود
👏67👎13😡2👍1🤬1
Forwarded from 1N73LL1G3NC3
Writing Nimless nim.pdf
7.2 MB
Writing Nimless Nim

Talk that was given at BSIDESKC 2024 about how to write Nim code without the Nim and C Runtime. This repo will serve as a living document to expand on concepts for writing NRT-less and CRT-less code.

Slides and source: https://github.com/m4ul3r/writing_nimless
👍6👎1