Source Byte – Telegram
Source Byte
7.74K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
I'm not really a reverse engineer 🤷‍♂
🔥7👾4👍3
3👍1
Forwarded from Reverse Dungeon
Поскольку контента нет, напомню, что есть бложик с каким-то количество всяких статей
ブログ.きく.コム

В том числе подборка кучи всяких полезностей, связанных с ревёрсом
ブログ.きく.コム/2021/10/02/Reverse-Engineering-Roadmap/

😎❤️
Please open Telegram to view this post
VIEW IN TELEGRAM
👾94👍1🔥1
👍3🔥3👾3👏1
Powershell AMSI Bypass technique via Vectored Exception Handler (VEH).
This technique does not perform assembly instruction patching, function hooking or Import Address Table (IAT) modification.

https://github.com/vxCrypt0r/AMSI_VEH
👍71
6👍1
Forwarded from CyberSecurity Shield (Pouyan Zamani)
SANS SEC450-2-Black.pdf
12.2 MB
👍51🔥1🍓1
Forwarded from CyberSecurity Shield (Pouyan Zamani)
با سلام و خسته نباشید خدمت همه عزیزان
عذرخواهی ویژه بابت تاخیر طولانی،
بخش دوم دوره SCE 450 با همون فرمون قبلی خدمت شما عزیزان 😁🌹🙏🏻
4👍2
Injecting Malicious Code into PDF Files and Creating a PDF Dropper

PDF files are often considered static documents by most people. However, the PDF standard allows for the execution of JavaScript code within the document. This feature offers various attack vectors that can be used for Red Team tests and cybersecurity research. In this article, we will examine how to inject JavaScript into a PDF file to download a file from a specific URL and establish a Command and Control (C2) connection using this method.


https://cti.monster/blog/2024/07/25/pdfdropper.html
👍7🤣3
🤣2114👾1
JonMon.pdf
2.5 MB
Unleashing JonMon:
Deep Insights into Your Windows Activity
By: Jonny Johnson
🔥3👍21
Deep Sea Phishing

[ 00 ] How to Bypass EDR With Custom Payloads
If endpoint detection and response (EDR) protections keep blocking your phishing payloads, you really should learn how to write custom payloads. If you’ve never written a custom payload, this is a great place to start. If you have some experience with custom payloads, I hope I can at least simplify the way you think about payload design to make it easy and fun.



[ 01 ] Making Your Malware Look Legit to Bypasses EDR
I wanted to write this blog about several good techniques for endpoint detection and response (EDR) evasion; however, as I was writing about how to evade EDRs, I was hit with an epiphany:“EDR evasion is all about looking like legitimate software” — ph3eds, 2024
👾9👍3🔥2
💅3😘2👍1
PowerOfTcb

This directory covers how to use SeTcbPrivilege for educational purpose. SeTcbPrivilege is a multi puropse privilege. A user has SeTcbPrivilege is able to perform various token manipulation. For example, following token factors class can be manipulated with SeTcbPrivilege (but most of them cannot be manipulated for assigned primary token):

Session ID
Origin
Mandatory Policy
Integrity Level (downgrade operation does not require SeTcbPrivilege)


https://github.com/daem0nc0re/PrivFu/tree/main/PowerOfTcb
👍3
😭😭
👾8👍2😁2🤣1🤓1
Windows Process Access Token and user privilege
Privileges are listed and explained at: MSDN

use the Windows Privileges to elevate your rights within the OS.
Priv2Admin

Understanding and Abusing Process Tokens — Part I
Understanding and Abusing Process Tokens — Part II‌

Access Tokens‌

Abusing Tokens

Adjusting Process Token Privileges

Stealing Access Tokens From Office Desktop Applications

#windows #token #internals
👾112👍1🔥1
Forwarded from Yashar Mahmoudnia
windows-security-internals-deep-dive.pdf
6.3 MB
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing

True PDF - Final
_
11👍1