Check out the full source code of EagleSpy and tailor it to your preferences.
#source
#malware_analysis
#malware_dev #malware
#source
#malware_analysis
#malware_dev #malware
👍2 2🔥1
In-memory Obfuscation
cerdit : Djordje Atlialp
https://oldboy21.github.io/posts/2024/05/swappala-why-change-when-you-can-hide/
cerdit : Djordje Atlialp
https://oldboy21.github.io/posts/2024/05/swappala-why-change-when-you-can-hide/
Media is too big
VIEW IN TELEGRAM
📽 ارائهی کامل «مهدی حاتمی» در رویداد PHDays 2 یا Positive Hack Days 2 روسیه، تحتعنوان «Hunting APTs with OPSEC Mistakes» رو میتونی از لینک زیر، توی YouTube آکادمی راوین، تماشا کنی. زیرنویس فارسی این ارائه هم بهزودی منتشر میشه.
🔗 YouTube
🔗 YouTube
🔥5 3👏1😁1
Important warning to people who have anonymous activity - on Twitter, Telegram, etc. Don't put a hamster link! Although it only shows the subcategories in the bot, and apparently the person himself does not have the ability to see the account that invited him, but in practice, by checking the api requests, we see that the identity of the inviting person is also known!
credit : Ali , Mohammad Zarchi
source :
https://x.com/ali_r7h/status/1798103831244636261 ,
https://x.com/mhzarchi/status/1798365439262867689
credit : Ali , Mohammad Zarchi
source :
https://x.com/ali_r7h/status/1798103831244636261 ,
https://x.com/mhzarchi/status/1798365439262867689
❤3 3👍1
8.3.7z
852.4 MB
IDA Pro Version 8.3 (with tools, sdk + keygen for x86_x64, ARM, ARM64, PPC, PPC64, and MIPS decompilers! )
#ida
#reverse
#ida
#reverse
Assembly for Hackers from Reza Rashidi
https://redteamrecipe.com/assembly-for-hackers
#assembly
#reverse
Table of contents
Syntax
Comments
Assembly Language Statements
Syntax of Assembly Language Statements
Example: Hello World Program in Assembly
Compiling and Linking
Sections
Processor Registers
System Calls
Strings
String Instructions
Repetition Prefixes
Numbers
BCD Representation
Instructions:
Conditions
CMP Instruction
Conditional Jump Instructions (Signed Data)
Conditional Jump Instructions (Unsigned Data)
Special Conditional Jump Instructions
Addressing Modes
MOV Instruction
File Handling
Example: Reading from a File
Stack and Memory
Stack and Memory
Tools for Analysis
Code Injection Attack
DLL Injection
APC Injection
Valid Accounts
System Binary Proxy Execution: Rundll32
Reflective code loading
Modify Registry
Process Injection
Mark-Of-The-Web (MOTW) Bypass
Access Token Manipulation
Hijack Execution Flow
Resources
https://redteamrecipe.com/assembly-for-hackers
#assembly
#reverse
Forwarded from Sina
Hello everyone,
I've made a somehow big update in the HyperDbg. Now, it utilizes a dedicated HOST IDT and HOST GDT, different than the Windows IDT/GDT. This update will address a specific category of bypasses for HyperDbg, although there are still many bypasses to address. This change influences the handling of interrupts, especially NMIs for halting cores in VMX root-mode. lt may introduce instability issues in various systems, potentially leading to crashes. If you're using HyperDbg, please switch to the 'dev' branch and re-build and test it to help us identify any problems. Currently, it works well on my 12th Gen machine, but I'm uncertain if it's universally stable. If you encounter any crashes or BSODs, please notify me before the release of v0.9 (the next version). The best way to test it is using events (EPT hooks) with a high rate of execution (e.g., using !epthook on nt!ExAllocatePoolWithTag and meanwhile pause the debuggee).
The 'dev' branch:
https://github.com/HyperDbg/HyperDbg/tree/dev
GitHub built artifact for those who can't build:
https://github.com/HyperDbg/HyperDbg/actions/runs/9384856535
I've made a somehow big update in the HyperDbg. Now, it utilizes a dedicated HOST IDT and HOST GDT, different than the Windows IDT/GDT. This update will address a specific category of bypasses for HyperDbg, although there are still many bypasses to address. This change influences the handling of interrupts, especially NMIs for halting cores in VMX root-mode. lt may introduce instability issues in various systems, potentially leading to crashes. If you're using HyperDbg, please switch to the 'dev' branch and re-build and test it to help us identify any problems. Currently, it works well on my 12th Gen machine, but I'm uncertain if it's universally stable. If you encounter any crashes or BSODs, please notify me before the release of v0.9 (the next version). The best way to test it is using events (EPT hooks) with a high rate of execution (e.g., using !epthook on nt!ExAllocatePoolWithTag and meanwhile pause the debuggee).
The 'dev' branch:
https://github.com/HyperDbg/HyperDbg/tree/dev
GitHub built artifact for those who can't build:
https://github.com/HyperDbg/HyperDbg/actions/runs/9384856535
GitHub
GitHub - HyperDbg/HyperDbg at dev
State-of-the-art native debugging tools. Contribute to HyperDbg/HyperDbg development by creating an account on GitHub.
❤7👍1
fuzzer-internals from One of my lovely friends
https://blog.reodus.com/posts/fuzzer-internals-part1/
#fuzzer
#internals
https://blog.reodus.com/posts/fuzzer-internals-part1/
#fuzzer
#internals
Malware Development, Analysis and DFIR Series PART III
credit : Nithin Chenthur Prabhu
Delve into Windows Memory Internals! Explore virtual address spaces, process internals and memory models for a deeper understanding of memory forensics & malware analysis!
https://azr43lkn1ght.github.io/Malware Development, Analysis and DFIR Series
credit : Nithin Chenthur Prabhu
Delve into Windows Memory Internals! Explore virtual address spaces, process internals and memory models for a deeper understanding of memory forensics & malware analysis!
https://azr43lkn1ght.github.io/Malware Development, Analysis and DFIR Series
❤5 2👍1🥰1
SWAPPALA and Reflective DLL
credit : Kyle Avery
https://oldboy21.github.io/posts/2024/06/sleaping-issues-swappala-and-reflective-dll-friends-forever/
credit : Kyle Avery
https://oldboy21.github.io/posts/2024/06/sleaping-issues-swappala-and-reflective-dll-friends-forever/
❤3
چند تا write-up درباره باگهایی که از کرنل Linux/Windows/macOS گزارش دادم و چگونه فازر کردنشون
رو تو وبلاگم 👇 اینجا نوشتم. پست جدیدم رو هم به زودی همینجا مینویسم.
R00tkitSMM-> میثم فیروزی
https://r00tkitsmm.github.io/?s=09
رو تو وبلاگم 👇 اینجا نوشتم. پست جدیدم رو هم به زودی همینجا مینویسم.
R00tkitSMM
https://r00tkitsmm.github.io/?s=09
Forwarded from Network books | Magazine (Q)
This media is not supported in your browser
VIEW IN TELEGRAM
👍3
Forwarded from Network books | Magazine (Q)
Programming with Rust (Donis Marshall).pdf
2.5 MB
🥰4👾4👍3👀1 1