Source Byte – Telegram
Source Byte
7.74K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
7. Learn Assembly/Reverse Engineering
Assembly is a language, being able to Reverse Engineer is a skill
that acquires knowledge of Assembly. When you don't have access to the source
code of programs, you need to be able to reverse engineer to understand how the game works and what it is doing. Being able to reverse engineer will allow you to find functions,classes, and variables that are useful to you. This is a very powerful skill. It is ESSENTIAL for game hacking. When you know how everything works you can make it or break it.
It is more important to be able to read in Assembly than to write in it. You have C++ to write for you(low memory manipulation remember?) .
I recommend the Art of Assembly, And The Secrets of Reverse Engineering as ebooks for learning.
I also recommend reversing your own programs in C++ while also learning.
For example program a hello world in C++ and reverse it in tools like Ollydbg or IDA.
Then code up a little more complex program with basic variables and reverse it,
then add operations and reverse that, etc.



8. The most important thing is to mess around, and apply the skills you learned.
To be able to game hack, is something you have to learn by doing, trial and error. View other people sources. Just remember, with persistence you will win!


Google is your friend and there are many great threads on this forum.

https://github.com/dsasmblr/game-hacking

https://youtube.com/@guidedhacking?si=yO6hN8ZEn1zc28-2


https://news.1rj.ru/str/Source_byte/1930

If you truly want to be able to create game hacks, then you will get there.

Be Curious and keep learning.




#game
6👍2
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from RedBlueTM Hit (Salver Nicolson)
#udemy - Game Hacking: Cheat Engine Game Hacking Basics

@RedBlueHit 💀👀
@RedBlueTM 🔒
5👍4
Forwarded from RedBlueTM Hit (Salver Nicolson)
Game Hacking Cheat Engine Game Hacking Basics.part1.rar
1.9 GB
3👍2
Forwarded from RedBlueTM Hit (Salver Nicolson)
Game Hacking Cheat Engine Game Hacking Basics.part2.rar
263.6 MB
3👍2
GameHackingAcademy.pdf
27.8 MB
GameHackingAcademy.pdf

#game
6👍5
Forwarded from ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌$ᴘ3ᴅʏʟ1👾
Cheating in Online Games.pdf
7.5 MB
Cheating in Online Games. A Case Study of Bots and Bot-Detection in Browser-Based Multiplayer Games by Erik Wendel, 2012
5👍2🔥1
Source Byte pinned a photo
This media is not supported in your browser
VIEW IN TELEGRAM
😁8👍22🥰1
Techniques Learned from the XZ Backdoor

The IFUNC feature of GLIBC
Concealing characters using Radix Tree
Obtaining all dependency information
Hooking Functions from Other Dependency Libraries


https://medium.com/@knownsec404team/techniques-learned-from-the-xz-backdoor-74b0a8d45c30

#cve , #CVE_2024_3094
33👍2
pspy is a command line tool designed to snoop on processes without need for root permissions. It allows you to see commands run by other users, cron jobs, etc. as they execute.

https://github.com/DominicBreuker/pspy

#tool
4👌2👍1
Embedding encrypted payloads in resource section
Payload


placement: .rsrc section
Adding a resource to our project
Retrieving payload contents
Locating resource
Loading resource contents
Obtain a pointer
Decrypting the payload
Execution


https://ry0dan.github.io/malware%20development/Malware-Development-Crafting-Digital-Chaos-03/

credit : Motawkkel Abdulrhman

#malware_dev
6👍3
Forwarded from Ralf Hacker Channel (Ralf Hacker)
Один из подписчиков поделился новым курсом от Sektor7, и был не против отдать его в массы. Это уже третья часть про разработку малвари: Malware Development Advanced Vol.1

Остальные курсы Sector7 тоже есть на канале:
1. RTO: Malware Development Essentials
2. RTO: Windows Persistence
3. RTO: Privilege Escalation in Windows
4. RTO: Malware Development Intermediate
5. RTO: Evasion Windows

#course #malware #redteam #pentest
7👍2
Forwarded from Ralf Hacker Channel (Ralf Hacker)
RTO - Malware Development Advanced Vol. 1.zip
1.5 GB
7👍2
Active Directory Enumeration for Red Teams
In this post, we will explore how defenders can monitor for suspicious LDAP activity, as well as operational security approaches for red teams conducting LDAP reconnaissance.

credits : Dominic Chell
https://www.mdsec.co.uk/2024/02/active-directory-enumeration-for-red-teams/



you should not miss this blog :)
5👍31
Forwarded from Offensive Xwitter
😈 [ eversinc33 🩸🗡️ @eversinc33 ]

If you are facing an EDR with PEB protection/obf which makes Ldr inaccessible & want to inject shellcode, just pass the VA of LoadLibrary (which is consistent across processes) to the shellcode via egg-hunting from your injector, enabling lib resolution without touching the PEB.

🐥 [ tweet ]

*смешной срач в треде*
👍3🔥1
Forwarded from white2hack 📚
System32 Important Files by Hadess, 2024

#windows
6👍1