Source Byte – Telegram
Source Byte
7.74K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Please open Telegram to view this post
VIEW IN TELEGRAM
Source Byte
Message
Also now we have part 4
👍4
Forwarded from OnHex
🔴 بخشی از اسلایدهای کنفرانس Black HAT USA 2024 رو میتونید از گیتهابمون بصورت تکی و یکجا دانلود کنید.

#کنفرانس #blackhat #bhusa24

🆔 @onhex_ir
➡️ ALL Link
👍1
The swiss army knife of LSASS dumping
https://github.com/fortra/nanodump

#lsass #windows #maldev
🥱5👍3😴2👎1🗿1
🤣17👍2
Source Byte pinned a photo
there is red-team workshop on 14 pm ( tehran time ) ( language -> persian )

mr.hashemi is going to talk about APT-38

it's going to be fun and a long workshop as he talking about all TTPs
so
فلاسک چای و خوراکی فراموش نشه :)


access work shop here ( no registration needed ) :
https://www.skyroom.online/ch/huntlearn/redteam

ended , will update the link with recorded version


.
👾9🔥6👍3❤‍🔥1
Forwarded from Infosec Fortress
This media is not supported in your browser
VIEW IN TELEGRAM
Hello again! I’m excited to announce a new feature in the plugin: it now supports regex-based searches. This means you can find instructions not just by their mnemonics, but also by using powerful regular expressions for more precise and flexible matching.

The Repository link

#projects
———
🆔 @Infosec_Fortress
4👾2👍1
💀
😁10💩5👍1🤮1🤡1
A collection of tools which integrate with Cobalt Strike
(and possibly other C2 frameworks) through BOF and reflective DLL loading techniques.



https://github.com/outflanknl/C2-Tool-Collection
👍21
Directory Services Internals (DSInternals)
Ad toolkit ,PowerShell Module and Framework


https://github.com/MichaelGrafnetter/DSInternals/tree/master

#ad
👍3
Credential_Dumping_NTDS_dit_1628039354.pdf
1.2 MB
Credential Dumping: NTDS.dit
In this article, you will learn how passwords are stored in NTDS.dit file on Windows Server and then we will learn how to dump these credentials hashes from NTDS.dit file.
Table of Content
Introduction to NTDS NTDSPartitions
DatabaseStorageTable
ExtractingCredentialbyExploitNTDS.ditinMultipleMethods
FGDump
NTDSUtil
DSInternals
NTDSDumpEx Metasploit
NTDS_location NTDS_grabber secretsdump
CrackMapExec
CrackingHashes


#ad #active_directory
👍8
Windows API Function Cheatsheets

https://github.com/7etsuo/windows-api-function-cheatsheets


index :
File Operations
Process Management
Memory Management
Thread Management
Dynamic-Link Library (DLL) Management
Synchronization
Interprocess Communication
Windows Hooks
Cryptography
Debugging
Winsock
Registry Operations
Error Handling
Resource Management
Unicode String Functions
String Length
String Copy
String Concatenation
String Comparison
String Search
Character Classification and Conversion
Win32 Structs Cheat Sheet
Common Structs
Win32 Sockets Structs Cheat Sheet (winsock.h)
Win32 Sockets Structs Cheat Sheet (winsock2.h)
Win32 Sockets Structs Cheat Sheet (ws2def.h)
Code Injection Techniques
1. DLL Injection
2. PE Injection
3. Reflective Injection
4. APC Injection
5. Process Hollowing (Process Replacement)
6. AtomBombing
7. Process Doppelgänging
8. Process Herpaderping
9. Hooking Injection
10. Extra Windows Memory Injection
11. Propagate Injection
12. Heap Spray
13. Thread Execution Hijacking
14. Module Stomping
15. IAT Hooking
16. Inline Hooking
17. Debugger Injection
18. COM Hijacking
19. Phantom DLL Hollowing
20. PROPagate
21. Early Bird Injection
22. Shim-based Injection
23. Mapping Injection
24. KnownDlls Cache Poisoning
Process Enumeration
🔥4👍3👾2😢1
BounceBack
redirector for your red team operation security

https://github.com/D00Movenok/BounceBack

#c2 #infrastructure #redteam #redirector
3👎1
Forwarded from sanad
Ringzer0 RET2 Browser Exploitation.rar
11 MB
👍6👎5
👍3