Forwarded from RavinAcademy
🥁 رویداد امنیت سایبری PHDays روسیه از سال ۲۰۱۱ شروعبهکار کرد و از سال گذشته، توی ابعادی وسیعتر، به یه جشنوارهی بینالمللی و بزرگترین رویداد امنیت سایبری روسیه تبدیل شد. برنامههای این رویداد نهتنها برای متخصصان این حوزه، که برای عموم مردم، بهخصوص کودکان و نوجوانان، ترتیب داده میشه. جشنوارهی PHDays 2 یا Positive Hack Days 2، امسال از ۳ تا ۶ خرداد، توی مجموعهی ورزشی لوژنیکی مسکو برگزار شد. رویدادی که شامل بخشها و برنامههای متنوع تخصصی و تعاملی امنیت سایبری و دنیای دیجیتال بود و توی بخش ارائههای فنی، «مهدی حاتمی» از آکادمی راوین هم یه ارائه داشت.
📣 یه ویدیوی کوتاه و گزارش تصویری از این رویداد رو آماده کردیم که تماشا کنی.
🔗 تماشای ویدیوی خلاصهی رویداد: آپارات | YouTube
@RavinAcademy
📣 یه ویدیوی کوتاه و گزارش تصویری از این رویداد رو آماده کردیم که تماشا کنی.
🔗 تماشای ویدیوی خلاصهی رویداد: آپارات | YouTube
@RavinAcademy
👏6🔥2
DarkPulse is a shellcode packer written in Go. It is used to generate various shellcode loaders.
https://github.com/fdx-xdf/darkPulse
#malware_dev
https://github.com/fdx-xdf/darkPulse
#malware_dev
BinaryNinja_4.0.4958.7z
293.6 MB
❤🔥4 3👍1
GoThief
GitHub
#stealer #malware_dev
Recently, I encountered such a scenario in an attack and defense game. The target machine accessed the internal application system and was uniformly controlled by VPN. After connecting to VPN, the connection with the external network would be disconnected, resulting in the inability to issue commands in real time. Therefore, I had the idea of developing this small tool. By taking screenshots of the keyboard and recording the clipboard, I could obtain the target's operations after connecting to VPN, and collect sensitive information for the next step of lateral movement.
GitHub
#stealer #malware_dev
Check out the full source code of EagleSpy and tailor it to your preferences.
#source
#malware_analysis
#malware_dev #malware
#source
#malware_analysis
#malware_dev #malware
👍2 2🔥1
In-memory Obfuscation
cerdit : Djordje Atlialp
https://oldboy21.github.io/posts/2024/05/swappala-why-change-when-you-can-hide/
cerdit : Djordje Atlialp
https://oldboy21.github.io/posts/2024/05/swappala-why-change-when-you-can-hide/
Media is too big
VIEW IN TELEGRAM
📽 ارائهی کامل «مهدی حاتمی» در رویداد PHDays 2 یا Positive Hack Days 2 روسیه، تحتعنوان «Hunting APTs with OPSEC Mistakes» رو میتونی از لینک زیر، توی YouTube آکادمی راوین، تماشا کنی. زیرنویس فارسی این ارائه هم بهزودی منتشر میشه.
🔗 YouTube
🔗 YouTube
🔥5 3👏1😁1
Important warning to people who have anonymous activity - on Twitter, Telegram, etc. Don't put a hamster link! Although it only shows the subcategories in the bot, and apparently the person himself does not have the ability to see the account that invited him, but in practice, by checking the api requests, we see that the identity of the inviting person is also known!
credit : Ali , Mohammad Zarchi
source :
https://x.com/ali_r7h/status/1798103831244636261 ,
https://x.com/mhzarchi/status/1798365439262867689
credit : Ali , Mohammad Zarchi
source :
https://x.com/ali_r7h/status/1798103831244636261 ,
https://x.com/mhzarchi/status/1798365439262867689
❤3 3👍1
8.3.7z
852.4 MB
IDA Pro Version 8.3 (with tools, sdk + keygen for x86_x64, ARM, ARM64, PPC, PPC64, and MIPS decompilers! )
#ida
#reverse
#ida
#reverse
Assembly for Hackers from Reza Rashidi
https://redteamrecipe.com/assembly-for-hackers
#assembly
#reverse
Table of contents
Syntax
Comments
Assembly Language Statements
Syntax of Assembly Language Statements
Example: Hello World Program in Assembly
Compiling and Linking
Sections
Processor Registers
System Calls
Strings
String Instructions
Repetition Prefixes
Numbers
BCD Representation
Instructions:
Conditions
CMP Instruction
Conditional Jump Instructions (Signed Data)
Conditional Jump Instructions (Unsigned Data)
Special Conditional Jump Instructions
Addressing Modes
MOV Instruction
File Handling
Example: Reading from a File
Stack and Memory
Stack and Memory
Tools for Analysis
Code Injection Attack
DLL Injection
APC Injection
Valid Accounts
System Binary Proxy Execution: Rundll32
Reflective code loading
Modify Registry
Process Injection
Mark-Of-The-Web (MOTW) Bypass
Access Token Manipulation
Hijack Execution Flow
Resources
https://redteamrecipe.com/assembly-for-hackers
#assembly
#reverse