CBS - Custom Breakpoint Setter
This is an IDA Plugin powered by Python that sets a disabled breakpoint on specific instruction's mnemonic.
credit : AmirMohammad Jahangirzad
https://github.com/Reodus/CBS
This is an IDA Plugin powered by Python that sets a disabled breakpoint on specific instruction's mnemonic.
credit : AmirMohammad Jahangirzad
https://github.com/Reodus/CBS
👍3❤2👏2
Forwarded from Source Chat (Friend)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Bauka
Zhassulan_Zhussupov_Malware_Development_for_Ethical_Hackers_Learn.pdf
51.5 MB
Zhassulan_Zhussupov_Malware_Development_for_Ethical_Hackers_Learn.pdf
👍9👎6🤣2
Red Team infrastructure hardening resources
[+] GitHub
[ Slides ]
#c2 #redteam
[+] GitHub
This wiki is intended to provide a resource for setting up a resilient Red Team infrastructure. It was made to complement Steve Borosh (@424f424f) and Jeff Dimmock's (@bluscreenofjeff) BSides NoVa 2017 talk "Doomsday Preppers: Fortifying Your Red Team Infrastructure" (slides)
[ Slides ]
#c2 #redteam
❤6👍4🔥2🍾1
This media is not supported in your browser
VIEW IN TELEGRAM
Silently install Chrome extensions by modifying the configuration file
https://syntax-err0r.github.io/Silently_Install_Chrome_Extension.html
#chrome #extension
In practice, Chrome usually turns on remote debugging, which is a very risky approach.
https://syntax-err0r.github.io/Silently_Install_Chrome_Extension.html
#chrome #extension
🔥7👍2
IAT-Tracer V2
IAT-Tracer V2 is a plugin for Tiny-Tracer framework
credit : Yoav Levi
https://github.com/YoavLevi/IAT-Tracer
IAT-Tracer V2 is a plugin for Tiny-Tracer framework
Now, you can automatically trace and watch any Windows API function a binary uses, whether imported or *dynamically resolved*.
credit : Yoav Levi
https://github.com/YoavLevi/IAT-Tracer
❤4👍3
Windows Internals Learning Resources
credit : Patrick Matula
A summary of learning resources in the categories:
https://github.com/pmatula/Windows-Internals-Learning-Resources
credit : Patrick Matula
A summary of learning resources in the categories:
+ Windows Internals
+ Windows Debugging and Troubleshooting
+ Windows Performance
+ Windows Programming
https://github.com/pmatula/Windows-Internals-Learning-Resources
🔥6👍1
https://github.com/mgeeky/ProtectMyTooling
Holy tool for red teamers
Holy tool for red teamers
GitHub
GitHub - mgeeky/ProtectMyTooling: Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented…
Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts watermarking, IOCs collection & PE Backdooring. You fe...
🔥9👍2❤1
Emulating inline decryption for triaging C++ malware
[ Blog ]
#malware_analysis
[ Blog ]
References
Glory Sprout string decryptor:
gsprout_string_decryption.py
Glory Sprout Hash resolver:
gsprout_api_resolver.py
GlorySprout sample:
Malwarebazaar
Insight from GlorySprout and Taurus Stelaer:
RussianPanda Research Blog
Let’s play (again) with Predator the thief
An In-Depth analysis of the new Taurus Stealer
#malware_analysis
👍4❤2🤷♂1
Unauthenticated SSRF on Havoc C2 teamserver via spoofed demon agent
Credit : Evan Ikeda
https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2/
Credit : Evan Ikeda
https://blog.chebuya.com/posts/server-side-request-forgery-on-havoc-c2/
👾6👍1
Forwarded from Iman
درود. من یک مطلب کوتاهی نوشتم برای درک پروسهای که توی کرنل رخ میده موقع Null-dereference (معماری x86) و مقداری در مورد Virtual Memory Management کرنل صحبت کردم. شاید برای بچههایی که روی آسیبپذیریهای سمت کرنل کار میکنن هم جالب باشه:
https://imanseyed.github.io/posts/the-flow-of-the-kernel-upon-receiving-a-sigsegv-for-null-dereferene/
https://imanseyed.github.io/posts/the-flow-of-the-kernel-upon-receiving-a-sigsegv-for-null-dereferene/
Code Sorcery
The Flow of the Kernel Upon Receiving a SIGSEGV for Null-Dereference
You might have seen “*(char*)0 = 0; - What Does the C++ Programmer Intend With This Code?” where JF Bastien discusses this line of code:
🔥8👍3👏1
11 Strategies of a World-Class Cybersecurity Operations Center
by mitre
by mitre
Strategy 1: Know What You Are Protecting and Why
Strategy 2: Give the SOC the Authority to Do Its Job
Strategy 3: Build a SOC Structure to Match Your Organizational Needs
Strategy 4: Hire AND Grow Quality Staff
Strategy 5: Prioritize Incident Response
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
Strategy 7: Select and Collect the Right Data
Strategy 8: Leverage Tools to Support Analyst Workflow
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
Strategy 10: Measure Performance to Improve Performance
Strategy 11: Turn up the Volume by Expanding SOC Functionality
👍3👎3🔥1
Forwarded from Stuff for Geeks (rВНm)
https://engineers.inpyjama.com/learn/ldd-101
Linux device driver development free course
#Linux
#Course
#English
Linux device driver development free course
#Linux
#Course
#English
👍3❤2
Forwarded from APT
Explore the Windows Kernel with HEVD, a vulnerable driver. Dive into stack overflow exploits and bypass SMEP/KPTI protections using the sysret approach.
A detailed guide for Windows kernel explotation:
— Part 0: Where do I start?
— Part 1: Will this driver ever crash?
— Part 2: Is there a way to bypass kASLR, SMEP and KVA Shadow?
— Part 3: Can we rop our way into triggering our shellcode?
— Part 4: How do we write a shellcode to elevate privileges and gracefully return to userland?
#windows #kernel #driver #hevd #hacksys
Please open Telegram to view this post
VIEW IN TELEGRAM
👍11👾4❤1
Global Windows outage hits computers around the world. This is linked to Crowdstrike update that cripples boot process.
Credit: Lukasz Olejnik
#CrowdStrike
Supposedly deleting “C-00000291*.sys” file in C:\Windows\System32\drivers\CrowdStrike directory fixes the issue. But editing system files you always do on your own risk :)
Credit: Lukasz Olejnik
#CrowdStrike
❤2👍1👾1