Forwarded from Kaisen (amin tahmasebi)
07.Object_Oriented_I.pdf
482.4 KB
Modern C++ Pdf 7
سلام بچه ها شبتون بخیر 😅
اینم بخش هفتم از آموزش مدرن سی پلاس پلاس
#modern_cpp
#c
#pdf
سلام بچه ها شبتون بخیر 😅
اینم بخش هفتم از آموزش مدرن سی پلاس پلاس
#modern_cpp
#c
👾3👍2🍾2
Forwarded from Kaisen (amin tahmasebi)
سلام بچه ها روزتون بخیر .
این برنامه های C که گذاشتم مثال هایی هستن که داخل فریم ورک c_std وجود دارن یعنی به واسطه پیاده سازی های که انجام دادم اینا رو پیاده کردم .که قابلیت های فریم ورک رو نشون بده .
نزدیک به 40 کتابخونه و صدها تابع و فیچر وجود داره و صدها مثال که نتیجه یکسال کار مداوم بوده یعنی ماه دیگه میشه 1 سال . 😁
امیدوارم ازش استفاده کنید و خب ایضا باگ های احتمالی رو برام ارسال کنید .
البته اینم بگم فریم ورک کاملا کراس پلتفرمه هیچ تغییر نیازی نیست بدید چه موقعی که بخوایید تووویندوز استفاده کنید یا لینوکس .
مواردی هم که نیاز باشه تو document گفتم
https://github.com/KaisenAmin/c_std
این برنامه های C که گذاشتم مثال هایی هستن که داخل فریم ورک c_std وجود دارن یعنی به واسطه پیاده سازی های که انجام دادم اینا رو پیاده کردم .که قابلیت های فریم ورک رو نشون بده .
نزدیک به 40 کتابخونه و صدها تابع و فیچر وجود داره و صدها مثال که نتیجه یکسال کار مداوم بوده یعنی ماه دیگه میشه 1 سال . 😁
امیدوارم ازش استفاده کنید و خب ایضا باگ های احتمالی رو برام ارسال کنید .
البته اینم بگم فریم ورک کاملا کراس پلتفرمه هیچ تغییر نیازی نیست بدید چه موقعی که بخوایید تووویندوز استفاده کنید یا لینوکس .
مواردی هم که نیاز باشه تو document گفتم
https://github.com/KaisenAmin/c_std
GitHub
GitHub - KaisenAmin/c_std: Implementation of C++ standard libraries in C
Implementation of C++ standard libraries in C. Contribute to KaisenAmin/c_std development by creating an account on GitHub.
👍5❤3
Forwarded from Just Security
Pentest award и ее команда информационной поддержки 💃 💃 💃
Предлагаем вашему вниманию топовые сообщества в тематике этичного хакинга, которые поддержали вторую ежегодную премию для пентестеров в этом году. Рекомендуем ознакомиться и подписаться:
BI.ZONE Bug Bounty
Ruscadasec
][akep
Safecodecon
Cyber Media
Anti-Malware
CISOCLUB
Кафедра «Криптология и кибербезопасность» НИЯУ МИФИ
CyberEd
Похек
Пакет безопасности
DEF CON Нижний Новгород
Hackerdom
PermCTF
Party_Hack
DEFCON Ульяновск
Mobile_appsec_world
Управление Уязвимостями и прочее
BugXplorer
APT
Что-то на пентестерском
ScriptKiddieNotes
Грустный Киберпанк
SHADOW:Group
PRO:PENTEST
AP Security
RPPA.pro
LamerZen
CyberYozh
White2hack
OSINT | Форензика
1N73LL1G3NC3
💃 Подавайте заявки на сайте — https://award.awillix.ru/
Предлагаем вашему вниманию топовые сообщества в тематике этичного хакинга, которые поддержали вторую ежегодную премию для пентестеров в этом году. Рекомендуем ознакомиться и подписаться:
BI.ZONE Bug Bounty
Ruscadasec
][akep
Safecodecon
Cyber Media
Anti-Malware
CISOCLUB
Кафедра «Криптология и кибербезопасность» НИЯУ МИФИ
CyberEd
Похек
Пакет безопасности
DEF CON Нижний Новгород
Hackerdom
PermCTF
Party_Hack
DEFCON Ульяновск
Mobile_appsec_world
Управление Уязвимостями и прочее
BugXplorer
APT
Что-то на пентестерском
ScriptKiddieNotes
Грустный Киберпанк
SHADOW:Group
PRO:PENTEST
AP Security
RPPA.pro
LamerZen
CyberYozh
White2hack
OSINT | Форензика
1N73LL1G3NC3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3❤1👍1
Forwarded from CyberSecurityTechnologies (-CST-)
HookChain.pdf
2 MB
#Research
"HookChain: A new perspective for Bypassing EDR Solutions", 2024.
"HookChain: A new perspective for Bypassing EDR Solutions", 2024.
👍5
Forwarded from H1gh l4nd3r
🔥 VMware vCenter Server RCE + PrivEsc
Multiple heap-overflow vulnerabilities in the implementation of the DCE/RPC protocol. They could allow a bad actor with network access to vCenter Server to achieve remote code execution by sending a specially crafted network packet.
— CVE-2024-37079: A heap-overflow vulnerability in the DCERPC protocol implementation of vCenter Server that allows a malicious actor with network access to send specially crafted packets, potentially leading to remote code execution. (CVSS v3.1 score: 9.8 "critical");
— CVE-2024-37080: Another heap overflow vulnerability in the DCERPC protocol of vCenter Server. Similar to CVE-2024-37079, it allows an attacker with network access to exploit heap overflow by sending crafted packets, potentially resulting in remote code execution. (CVSS v3.1 score: 9.8 "critical");
— CVE-2024-37081: This vulnerability arises from a misconfiguration of sudo in vCenter Server, permitting an authenticated local user to exploit this flaw to elevate their privileges to root on the vCenter Server Appliance. (CVSS v3.1 score: 7.8 "high").
Nuclei Template (PoC):
🔗 https://gist.github.com/tothi/0ff034b254aca527c3a1283ff854592a
Shodan
FOFA
#vmware #vcenter #rce #lpe #cve
Multiple heap-overflow vulnerabilities in the implementation of the DCE/RPC protocol. They could allow a bad actor with network access to vCenter Server to achieve remote code execution by sending a specially crafted network packet.
— CVE-2024-37079: A heap-overflow vulnerability in the DCERPC protocol implementation of vCenter Server that allows a malicious actor with network access to send specially crafted packets, potentially leading to remote code execution. (CVSS v3.1 score: 9.8 "critical");
— CVE-2024-37080: Another heap overflow vulnerability in the DCERPC protocol of vCenter Server. Similar to CVE-2024-37079, it allows an attacker with network access to exploit heap overflow by sending crafted packets, potentially resulting in remote code execution. (CVSS v3.1 score: 9.8 "critical");
— CVE-2024-37081: This vulnerability arises from a misconfiguration of sudo in vCenter Server, permitting an authenticated local user to exploit this flaw to elevate their privileges to root on the vCenter Server Appliance. (CVSS v3.1 score: 7.8 "high").
Nuclei Template (PoC):
🔗 https://gist.github.com/tothi/0ff034b254aca527c3a1283ff854592a
Shodan
product:"VMware vCenter Server"
FOFA
app="vmware-vCenter"
#vmware #vcenter #rce #lpe #cve
🔥3👍2❤1👎1💩1😴1
Forwarded from OnHex
🔴 ارائه های زیر از کنفرانس Nahamcon2024 در یوتیوب منتشر شد.
به پست مربوطه هم اضافه شد.
- js Files Are Your Friends
- Practical AI for Bounty Hunters
- Sluicing Scripts
#کنفرانس #امنیت_وب #باگ_بانتی
🆔 @onhex_ir
➡️ ALL Link
ONHEXGROUP
به پست مربوطه هم اضافه شد.
- js Files Are Your Friends
- Practical AI for Bounty Hunters
- Sluicing Scripts
#کنفرانس #امنیت_وب #باگ_بانتی
🆔 @onhex_ir
➡️ ALL Link
ONHEXGROUP
👏2👍1
Forwarded from Exploit Service
This media is not supported in your browser
VIEW IN TELEGRAM
Progressive Web Apps (PWAs) Phishing
More fake URL bars :)
POC: https://github.com/mrd0x/PWA-Phishing
Private: @ExploitServiceBot
Malware Shop: @MalwareShopBot
All projects @MalwareLinks
Angel Drainer: https://news.1rj.ru/str/+p2mOn-eGo4UzMTEx
Support: @angelsupport
More fake URL bars :)
POC: https://github.com/mrd0x/PWA-Phishing
Private: @ExploitServiceBot
Malware Shop: @MalwareShopBot
All projects @MalwareLinks
Angel Drainer: https://news.1rj.ru/str/+p2mOn-eGo4UzMTEx
Support: @angelsupport
👍4👎1🥱1
👾2👍1
DLHell
https://github.com/synacktiv/DLHell
#malware_dev
DLHell is a tool for performing local and remote DCOM Windows DLL proxying. It can intercept DLLs on remote objects to execute arbitrary commands. The tool supports various authentication methods and provides capabilities for local and remote DLL proxying, as well as DCOM DLL proxying.
https://github.com/synacktiv/DLHell
#malware_dev
❤4👍1
UK's largest nuclear site denies being hacked but pleads guilty over cybersecurity failures
https://therecord.media/sellafield-guilty-plea-uk-nuclear-facility-cybersecurity
https://therecord.media/sellafield-guilty-plea-uk-nuclear-facility-cybersecurity
🤣4👍2
From secret images to encryption keys.
credit : HOSEIN. YAVARZADEH
https://thecyberwire.com/podcasts/research-saturday/330/notes
The research can be found here:
Graph: Growing number of threats leveraging Microsoft API
credit : HOSEIN. YAVARZADEH
This week, we are joined by Hosein Yavarzadeh from the University of California San Diego, as he is discussing his work on "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor" This paper introduces new methods that let attackers read from and write to specific parts of high-performance CPUs, such as the path history register (PHR) and prediction history tables (PHTs).
https://thecyberwire.com/podcasts/research-saturday/330/notes
The research can be found here:
Graph: Growing number of threats leveraging Microsoft API
👍5
Source Byte
From secret images to encryption keys. credit : HOSEIN. YAVARZADEH This week, we are joined by Hosein Yavarzadeh from the University of California San Diego, as he is discussing his work on "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional…
This media is not supported in your browser
VIEW IN TELEGRAM
👾Lets Create An EDR… And Bypass It!
Part 1
Part 2
--------------------------------------------------------------
Related stuff:
[+] An Introduction to Bypassing User Mode EDR Hooks
[+] Blinding EDR On Windows
[+] How your EDR actually works
#EDR
Part 1
Part 2
--------------------------------------------------------------
Related stuff:
∆ Simple EDR In Nim
∆ EDR IS BY NO MEANS THE FINAL SOLUTION [ Blog ]
∆ A brief analysis of EDR architecture - taking Windows platform as an example [ Blog ]
∆ Summary of all EDR bypass methods found so far [ blog ]
[+] An Introduction to Bypassing User Mode EDR Hooks
[+] Blinding EDR On Windows
[+] How your EDR actually works
#EDR
👾4❤1🤨1