Source Byte – Telegram
Source Byte
7.74K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
👍5
Automating Malware Deobfuscation with Binary Ninja
Writing a Static Unpacker

This section will teach participants how to automate unpacking and decryption of malware samples. This will be accomplished using the Qakbot sample as an example. The Qakbot sample is packed (obfuscated using an external program that “unpacks itself”) and therefore we will perform multiple hands-on exercises to automate the extraction of Qakbot from its packed form using Binary Ninja, PEFile and Binary Refinery.
+ The first exercise will teach attendees how to use Binary Ninja to identify the encryption algorithm used by the first stage of the packer and how to extract key information to decrypt the second stage.

+The next exercise will teach attendees how to use PEFile to extract an embedded resource from the packed binary. Once extracted, the resource will then be decrypted using the key information from the first exercise

The next exercise will teach attendees how to use Binary Refinery to carve binary files from the decrypted resource


Code

Slides

Workshop Manual
👍6
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
(Used by APT-60)


#apt #analysis #cve
👍7🌚1
The SOS Intelligence CVE Chatter Weekly Top Ten
This weekly blog post is from via our unique intelligence collection pipelines. We are your eyes and ears online, including the Dark Web.

https://sosintel.co.uk/category/cve-top-10/

———

CISA ( America's Cyber Defence Agency )
Bulletins provide weekly summaries of new vulnerabilities.

https://www.cisa.gov/news-events/bulletins

———
👍51
Silly EDR Bypasses and Where To Find Them
Credit: Marcus Hutchins
A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.

_ Article _

https://github.com/MalwareTech/EDRception.git

#edr #redteam
👍6
Forwarded from Source Chat (Friend)
Please open Telegram to view this post
VIEW IN TELEGRAM
The Enigma_7.40 _x86_x64.7z
52.9 MB
The Enigma 7.40 x86 & x64
#packer #protector #reverse


Thanks to Sh4doVV
👍11
🥸
🤣36🗿4
Forwarded from Order of Six Angles
The tragedy of low-level exploitation

https://gynvael.coldwind.pl/?id=791

похожие мысли всегда в голове крутились
👍4🤣3
🤣7👍2
Forwarded from old hamood
Media is too big
VIEW IN TELEGRAM
قسمت اول دوره چیتینگ
6👍3
11👾3👍1