Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
👾Lets Create An EDR… And Bypass It!
Part 1
Part 2

--------------------------------------------------------------
Related stuff:
Simple EDR In Nim

∆ EDR IS BY NO MEANS THE FINAL SOLUTION [ Blog ]

∆ A brief analysis of EDR architecture - taking Windows platform as an example [ Blog ]

Summary of all EDR bypass methods found so far [ blog ]


[+] An Introduction to Bypassing User Mode EDR Hooks

[+] Blinding EDR On Windows

[+] How your EDR actually works


#EDR
👾41🤨1
Windows internals
⎗ Notes On Process in windows

Notes 1
Notes 2
Windows Internals Research Tips
9 Days: Learn windows internals

#internals #windows
👾6👍3
PHP7 Internals - Become a Wizard
credit : faulty *ptrrr

Welcome to the PHP Internals Hub - If you ever wondered about how PHP works internally and how you can exploit it: this is where you should start.
In this repo, I show basic and advanced exploitation in PHP (some of the bugs reported by me)
. In every "chapter", you'll learn a little bit more about PHP Internals from an infosec perspective.

https://github.com/0xbigshaq/php7-internals
———

#CVE-2020-7066 , #CVE-2020-7067 , #CVE-2020-10872 , #CVE-2020-10873 , #CVE-2018-12882 , #CVE-2018-12882
👍62
👾7🔥41
Source Byte pinned a photo
This media is not supported in your browser
VIEW IN TELEGRAM
Julian assange is free ;)
🔥13🕊3👍2🤯1🙏1🌭1
June 11th a Microsoft engineer accidentally leaked 4GB of Microsoft PlayReady internal code. It was leaked on the Microsoft Developer Community. The leak includes:

- WarBird configurations
- WarBird libraries for code obfuscation functionality
- Libraries with symbolic information related to PlayReady

Researchers from AG Security Research Lab were able to successfully build the Windows PlayReady dll library from the leaked code. Interestingly, they were assisted because on the Microsoft Developer Community forum a user also provided step-by-step instructions on how to begin the build process.

Also, interestingly, interestingly, the Microsoft Symbol Server doesn't block requests for PDB files corresponding to Microsoft WarBird libraries, which inadvertently leaks more information.

Adam Gowdiak of AG Security Research Lab reported the issue and Microsoft removed the forum post. However, as of this writing, the download link is still active.

File listing is below. Forums screenshots are attached. All information discovered by AG Security Research Lab

File listing: https://pastebin.com/raw/i65qfd2z
👍6
B0cde770200a945109437927ba3fe4d67638537352993712632_ICE_REPRO.zip
771 MB
👍6
⎙ Learning Symbolic analysis (Angr)

Samples
⎗ First Write-ups
⎗ Second Write-ups


@source_byte
#reverse #Hunting #angr
3👍1🔥1🥰1
2021_03_Lazy_Reversing_ShaktiCon.pdf
68.8 MB
Ost2: Symbolic analysis presentation
4👍1
🤯9😁3👾1
The Manga Guide to Cryptography 😂


internet is a weird place ....
😁64👍42
The Manga Guide to Cryptography.pdf
91.5 MB
🤷‍♂

#book
🤣84🤯4