Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Forwarded from Frey
rockyou2024.zip.011
3.9 GB
rockyou2024.zip.011
rockyou2024.zip.012
2.6 GB
rockyou2024.zip.012
👍12
Research into removing strings & API call references at compile-time (Anti-Analysis)
GitHub

An example in C/C++ of how we can remove static string & function call references by using obfuscation paired with runtime function pointers. As a result, static analysis using tools such as IDA or x64Dbg increases in time/difficulty. You may be able to hide specific API calls from anti-malware systems. On the other hand, some AVs might also flag this behavior as being malicious due to there being a lack of "real looking behavior" in the binary.
#malware_dev #evasion
👍43👾2🔥1
🤣24👍2
CBS - Custom Breakpoint Setter
This is an IDA Plugin powered by Python that sets a disabled breakpoint on specific instruction's mnemonic.

credit : AmirMohammad Jahangirzad

https://github.com/Reodus/CBS
👍32👏2
Forwarded from Source Chat (Friend)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Bauka
Zhassulan_Zhussupov_Malware_Development_for_Ethical_Hackers_Learn.pdf
51.5 MB
Zhassulan_Zhussupov_Malware_Development_for_Ethical_Hackers_Learn.pdf
👍9👎6🤣2
Red Team infrastructure hardening resources
[+] GitHub
This wiki is intended to provide a resource for setting up a resilient Red Team infrastructure. It was made to complement Steve Borosh (@424f424f) and Jeff Dimmock's (@bluscreenofjeff) BSides NoVa 2017 talk "Doomsday Preppers: Fortifying Your Red Team Infrastructure" (slides)

[ Slides ]

#c2 #redteam
6👍4🔥2🍾1
This media is not supported in your browser
VIEW IN TELEGRAM
Silently install Chrome extensions by modifying the configuration file
In practice, Chrome usually turns on remote debugging, which is a very risky approach.

https://syntax-err0r.github.io/Silently_Install_Chrome_Extension.html

#chrome #extension
🔥7👍2
IAT-Tracer V2

IAT-Tracer V2 is a plugin for Tiny-Tracer framework
Now, you can automatically trace and watch any Windows API function a binary uses, whether imported or *dynamically resolved*.


credit : Yoav Levi

https://github.com/YoavLevi/IAT-Tracer
4👍3
Windows Internals Learning Resources
credit : Patrick Matula

A summary of learning resources in the categories:

+ Windows Internals
+ Windows Debugging and Troubleshooting
+ Windows Performance
+ Windows Programming

https://github.com/pmatula/Windows-Internals-Learning-Resources
🔥6👍1
🤣22🤡53😁1
Emulating inline decryption for triaging C++ malware
[ Blog ]

References
Glory Sprout string decryptor:
gsprout_string_decryption.py
Glory Sprout Hash resolver:
gsprout_api_resolver.py
GlorySprout sample:
Malwarebazaar
Insight from GlorySprout and Taurus Stelaer:
RussianPanda Research Blog
Let’s play (again) with Predator the thief
An In-Depth analysis of the new Taurus Stealer


#malware_analysis
👍42🤷‍♂1
Unauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent
Credit : Evan Ikeda


https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2/
👾6👍1
Forwarded from Pwn3rzs
🤣30😁54
Forwarded from Iman
درود. من یک مطلب کوتاهی نوشتم برای درک پروسه‌ای که توی کرنل رخ می‌ده موقع Null-dereference (معماری x86) و مقداری در مورد Virtual Memory Management کرنل صحبت کردم. شاید برای بچه‌هایی که روی آسیب‌پذیری‌های سمت کرنل کار می‌کنن هم جالب باشه:
https://imanseyed.github.io/posts/the-flow-of-the-kernel-upon-receiving-a-sigsegv-for-null-dereferene/
🔥8👍3👏1
11 Strategies of a World-Class Cybersecurity Operations Center
by mitre

Strategy 1: Know What You Are Protecting and Why
Strategy 2: Give the SOC the Authority to Do Its Job
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
Strategy 4: Hire AND Grow Quality Staff
Strategy 5: Prioritize Incident Response
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
Strategy 7: Select and Collect the Right Data
Strategy 8: Leverage Tools to Support Analyst Workflow
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
Strategy 10: Measure Performance to Improve Performance
Strategy 11: Turn up the Volume by Expanding SOC Functionality
👍3👎3🔥1
Forwarded from Stuff for Geeks (rВНm)
👍32