Source Byte – Telegram
Source Byte
7.74K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Forwarded from CyberSecurity Shield (Pouyan Zamani)
SANS SEC450-2-Black.pdf
12.2 MB
👍51🔥1🍓1
Forwarded from CyberSecurity Shield (Pouyan Zamani)
با سلام و خسته نباشید خدمت همه عزیزان
عذرخواهی ویژه بابت تاخیر طولانی،
بخش دوم دوره SCE 450 با همون فرمون قبلی خدمت شما عزیزان 😁🌹🙏🏻
4👍2
Injecting Malicious Code into PDF Files and Creating a PDF Dropper

PDF files are often considered static documents by most people. However, the PDF standard allows for the execution of JavaScript code within the document. This feature offers various attack vectors that can be used for Red Team tests and cybersecurity research. In this article, we will examine how to inject JavaScript into a PDF file to download a file from a specific URL and establish a Command and Control (C2) connection using this method.


https://cti.monster/blog/2024/07/25/pdfdropper.html
👍7🤣3
🤣2114👾1
JonMon.pdf
2.5 MB
Unleashing JonMon:
Deep Insights into Your Windows Activity
By: Jonny Johnson
🔥3👍21
Deep Sea Phishing

[ 00 ] How to Bypass EDR With Custom Payloads
If endpoint detection and response (EDR) protections keep blocking your phishing payloads, you really should learn how to write custom payloads. If you’ve never written a custom payload, this is a great place to start. If you have some experience with custom payloads, I hope I can at least simplify the way you think about payload design to make it easy and fun.



[ 01 ] Making Your Malware Look Legit to Bypasses EDR
I wanted to write this blog about several good techniques for endpoint detection and response (EDR) evasion; however, as I was writing about how to evade EDRs, I was hit with an epiphany:“EDR evasion is all about looking like legitimate software” — ph3eds, 2024
👾9👍3🔥2
💅3😘2👍1
PowerOfTcb

This directory covers how to use SeTcbPrivilege for educational purpose. SeTcbPrivilege is a multi puropse privilege. A user has SeTcbPrivilege is able to perform various token manipulation. For example, following token factors class can be manipulated with SeTcbPrivilege (but most of them cannot be manipulated for assigned primary token):

Session ID
Origin
Mandatory Policy
Integrity Level (downgrade operation does not require SeTcbPrivilege)


https://github.com/daem0nc0re/PrivFu/tree/main/PowerOfTcb
👍3
😭😭
👾8👍2😁2🤣1🤓1
Windows Process Access Token and user privilege
Privileges are listed and explained at: MSDN

use the Windows Privileges to elevate your rights within the OS.
Priv2Admin

Understanding and Abusing Process Tokens — Part I
Understanding and Abusing Process Tokens — Part II‌

Access Tokens‌

Abusing Tokens

Adjusting Process Token Privileges

Stealing Access Tokens From Office Desktop Applications

#windows #token #internals
👾112👍1🔥1
Forwarded from Yashar Mahmoudnia
windows-security-internals-deep-dive.pdf
6.3 MB
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing

True PDF - Final
_
11👍1
IDA Pro 9.0.zip
463 MB
1. edit license owner and shit to whatever you want
2. place ida/ida64 dll/so/dylib in same dir as noscript
3. run the noscript to generate a license
4. copy the generated license and replace dlls with patched ones
5. run


#ida
👍4👏2😱1
Forwarded from Tim
IDA Professional 9.0.zip
416.4 MB
working crack for ida 9.0 arm64 mac os. Ill upload x86 mac os and linux once i wake up again. Just extract and place in your mac os applications folder
3👍2
Forwarded from Tim
might need to ad-hoc sign the libida64.dylib for it to launch
👍2
Forwarded from Tim
screenshot of it on my macbook decompiling an arm64 binary
👍2
Forwarded from Jose Coixao
idapro_90_x64win.exe
462.9 MB
👍2
Check here if you have any Question:
https://news.1rj.ru/str/ida_pro_chat
👍1