Forwarded from OnHex
x33fcon_Offensive Packer Development.pdf
1.2 MB
🔴 اسلاید و کدهای کارگاه Offensive Packer Development که توسط S3cur3Th1sSh1t و eversinc33 در جریان کنفرانس x33fcon 2024 ارائه شده، منتشر شدن.
در این کارگاه، در خصوص اینکه پکر چیه و چطوری کار میکنه مطالبی رو ارائه دادن و در سه زبان NIM و سی و RUST پکر توسعه دادن که کدهاشون اینجا در دسترسه.
خود کنفرانس x33fcon 2024 هم یک کنفرانس امنیتی برای تیم های آبی و قرمز هستش که امسال 13 و 14 ژوئن/24 و 25 خرداد بصورت مجازی و حضوری (لهستان) برگزار شده.
ارائه های جالبی داشته، برای دسترسی به اسلاید ارائه های امسال میتونید از این لینک استفاده کنید، ویدیوهای امسال کم کم داره در یوتیوب آپلود میشه و برای دسترسی به ارائه های سالهای قبل هم میتونید از این لینک استفاده کنید.
#کنفرانس #پکر #تیم_آبی #تیم_قرمز
#x33fcon #packer #OffensiveSecurity
🆔 @onhex_ir
➡️ ALL Link
در این کارگاه، در خصوص اینکه پکر چیه و چطوری کار میکنه مطالبی رو ارائه دادن و در سه زبان NIM و سی و RUST پکر توسعه دادن که کدهاشون اینجا در دسترسه.
خود کنفرانس x33fcon 2024 هم یک کنفرانس امنیتی برای تیم های آبی و قرمز هستش که امسال 13 و 14 ژوئن/24 و 25 خرداد بصورت مجازی و حضوری (لهستان) برگزار شده.
ارائه های جالبی داشته، برای دسترسی به اسلاید ارائه های امسال میتونید از این لینک استفاده کنید، ویدیوهای امسال کم کم داره در یوتیوب آپلود میشه و برای دسترسی به ارائه های سالهای قبل هم میتونید از این لینک استفاده کنید.
#کنفرانس #پکر #تیم_آبی #تیم_قرمز
#x33fcon #packer #OffensiveSecurity
🆔 @onhex_ir
➡️ ALL Link
👍4
Forwarded from Order of Six Angles
💋
pwn.college - ctf задания для начинающих
Commonly Abused Linux Initial Access Techniques and Detection Strategies
GoogleCTF 2024 Writeups
An unexpected journey into Microsoft Defender's signature World.
Static deobfuscator for Themida/WinLicense/Code Virtualizer's mutation-based obfuscation.
Persistence with GPO Item Level Targeting
Эксплуатация CVE-2024-29943 (слайды)
The Ultimate Aim of Kernel Exploitation - Process Credentials
Learning LLVM (Part-1) - Writing a simple LLVM pass
Exploiting V8 at openECSC
Hypervisor-enforced Paging Translation - The end of non data-driven Kernel Exploits (Recon2024) слайды pptx
Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust
A Tale of Reverse Engineering 1001 GPTs: The good, the bad And the ugly
OSED materials (twit)
PgC: Garbage collecting Patchguard away
pwn.college - ctf задания для начинающих
Commonly Abused Linux Initial Access Techniques and Detection Strategies
GoogleCTF 2024 Writeups
An unexpected journey into Microsoft Defender's signature World.
Static deobfuscator for Themida/WinLicense/Code Virtualizer's mutation-based obfuscation.
Persistence with GPO Item Level Targeting
Эксплуатация CVE-2024-29943 (слайды)
The Ultimate Aim of Kernel Exploitation - Process Credentials
Learning LLVM (Part-1) - Writing a simple LLVM pass
Exploiting V8 at openECSC
Hypervisor-enforced Paging Translation - The end of non data-driven Kernel Exploits (Recon2024) слайды pptx
Rusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust
A Tale of Reverse Engineering 1001 GPTs: The good, the bad And the ugly
OSED materials (twit)
PgC: Garbage collecting Patchguard away
❤3👍3🤡1
Living Off The Land Drivers
https://www.loldrivers.io
list of malicious Windows drivers
Search for them via PowerShell
CVE-2020-12138 -> atillk64.sys
vulnerable driver (zam64.sys) using DeviceIoControl, to get NTAUTHORITY\SYSTEM
#windows
#Drivers
Living Off The Land Drivers is a curated list of Windows drivers used by adversaries to bypass security controls and carry out attacks. The project helps security professionals stay informed and mitigate potential threats.
https://www.loldrivers.io
list of malicious Windows drivers
Search for them via PowerShell
CVE-2020-12138 -> atillk64.sys
vulnerable driver (zam64.sys) using DeviceIoControl, to get NTAUTHORITY\SYSTEM
#windows
#Drivers
❤4🤡1👾1
Windows Exploit Development Tutorial Series and other things from FuzzySec
https://fuzzysecurity.com/tutorials.html
#exp #pwn
https://fuzzysecurity.com/tutorials.html
#exp #pwn
❤4👍2🤡2
Understanding - or at least, trying to
Credit: ATTL4S
BloG
#windows #ad #active_directory
Credit: ATTL4S
windows lateral movement, kerberos , payloads, active directory,etc
BloG
#windows #ad #active_directory
❤5👏2🤡2
Forwarded from
Разработка малварей под винду
Malware development part 1 - basics
Malware development part 2 - anti dynamic analysis & sandboxes
Malware development part 3 - anti-debugging
Malware development part 4 - anti static analysis tricks
Malware development part 5 - tips & tricks
Malware development part 6 - advanced obfuscation with LLVM and template metaprogramming
Malware development part 7 - Secure Desktop keylogger
Malware development part 8 - COFF injection and in-memory execution
Malware development part 9 - hosting CLR and managed code injection
Malware development part 1 - basics
Malware development part 2 - anti dynamic analysis & sandboxes
Malware development part 3 - anti-debugging
Malware development part 4 - anti static analysis tricks
Malware development part 5 - tips & tricks
Malware development part 6 - advanced obfuscation with LLVM and template metaprogramming
Malware development part 7 - Secure Desktop keylogger
Malware development part 8 - COFF injection and in-memory execution
Malware development part 9 - hosting CLR and managed code injection
👍7🤡4🔥2
Havoc C2 (Analysis)
The post will be updated...
#C2
⎚ Havoc Across the Cyberspace loader, dll, etc...
⎚ Defense against Havoc
⎚ Havoc C2 AV/EDR Bypass Methods Part 1 Part 2
⎚ test out the Sleep Obfuscation and also how write that
The post will be updated...
#C2
❤9👍3🤡2
Forwarded from APT
🔑 RockYou2024: 10 billion passwords leaked in the largest compilation of all time
Researchers discovered what appears to be the largest password compilation with a staggering 9,948,575,739 unique plaintext password
🔗 Source:
https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/
🔗 Source archive:
https://fastupload.io/1824d409732f30be
#wordlist #rockyou #passwords
Researchers discovered what appears to be the largest password compilation with a staggering 9,948,575,739 unique plaintext password
🔗 Source:
https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/
🔗 Source archive:
https://fastupload.io/1824d409732f30be
#wordlist #rockyou #passwords
🔥8👍4
Forwarded from Frey
👍13