Forwarded from Order of Six Angles
The tragedy of low-level exploitation
https://gynvael.coldwind.pl/?id=791
похожие мысли всегда в голове крутились
https://gynvael.coldwind.pl/?id=791
похожие мысли всегда в голове крутились
gynvael.coldwind.pl
FAQ: The tragedy of low-level exploitation
👍4🤣3
How detect data exfiltration:
https://blog.apnic.net/2022/03/31/how-to-detect-and-prevent-common-data-exfiltration-attacks/
https://blog.apnic.net/2022/03/31/how-to-detect-and-prevent-common-data-exfiltration-attacks/
APNIC Blog
How to: Detect and prevent common data exfiltration attacks | APNIC Blog
Guest Post: Mitigate for APT threats with these best practices for detecting and preventing data exfiltration attacks.
🔥3👍2🤣1
Forwarded from r0 Crew (Channel)
Native function and Assembly Code Invocation
https://research.checkpoint.com/2022/native-function-and-assembly-code-invocation/
#reverse #idapro
https://research.checkpoint.com/2022/native-function-and-assembly-code-invocation/
#reverse #idapro
Check Point Research
Native function and Assembly Code Invocation - Check Point Research
Introduction For a reverse engineer, the ability to directly call a function from the analyzed binary can be a shortcut that bypasses a lot of grief. While in some cases it is just possible to understand the function logic and reimplement it in a higher-level…
👍5
Win32 Reverse TCP Shellcode
Credit: Xenofon Vassilakopoulos
Pt1: https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-1-Locating-the-kernelbase-address/
Pt2: https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-2-Locate-the-Export-Directory-Table/
Pt3: https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-3-Constructing-the-reverse-shell-connection/
Code:
https://github.com/xen0vas/Win32-Reverse-TCP-Shellcode.git
#shellcode #asm #winasm
Wanna learn how to write shellcode for your specific purpose in windows?
This is what you need !
Credit: Xenofon Vassilakopoulos
Pt1: https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-1-Locating-the-kernelbase-address/
Pt2: https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-2-Locate-the-Export-Directory-Table/
Pt3: https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-3-Constructing-the-reverse-shell-connection/
Code:
https://github.com/xen0vas/Win32-Reverse-TCP-Shellcode.git
#shellcode #asm #winasm
👾9👍1
👍4❤2
🔥10👍3
Rust for Malware Development
This repository contains source codes of various techniques used by real-world malware authors, red teamers, threat actors, state-sponsored hacking groups etc. These techniques are well-researched and implemented in Rust.
https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main
#rust #maldev
❤8👍2
Forwarded from Pwn3rzs
Cobalt Strike 4.9
Download:
NOTE:
Our releases of Cobalt Strike will always be packed and obfuscated.
Unlike the crack previously shared by the Chinese website, to which we are not linked.
Download:
https://ponies.cloud/c2/CobaltStrike%204.9%20Cracked%20uCare@Pwn3rzs.7z
Password: 20231004_2218
Full Black client: https://ponies.cloud/c2/CobaltStrike%204.9%20Client%20Only%20Full%20Theme%20uCare@Pwn3rzs.7z
Password: 20231005_2033
Enjoy!NOTE:
Our releases of Cobalt Strike will always be packed and obfuscated.
Unlike the crack previously shared by the Chinese website, to which we are not linked.
❤8👍2
RedTeam Workshop - Part 1
https://www.youtube.com/watch?v=8drwwezrrYU
slides / notes :
https://github.com/soheilsec/RT-workshop-2024
credit : @soheilsec
language : persian
+ What is RedTeam
+ What is APT Group
+ Types of Hackers
+ Why RedTeam Matters
+ The Cost of Data Leakage and Data Breach
+ What is MitreAttack
https://www.youtube.com/watch?v=8drwwezrrYU
slides / notes :
https://github.com/soheilsec/RT-workshop-2024
credit : @soheilsec
🔥9👍2👎1
Analysis of a Caddy Wiper Sample Targeting Ukraine
Credit: Ali Mosajjal
https://blog.n0p.me/2022/03/2022-03-26-caddywiper/
Credit: Ali Mosajjal
FindFirstFileA
FindNextFileA
CreateFileA
GetFileSize
LocalAlloc
SetFilePointer
WriteFile
LocalFree
CloseHandle
FindClose
https://blog.n0p.me/2022/03/2022-03-26-caddywiper/
👍5👌1
The (Anti-)EDR Compendium
EDR functionality and bypasses in 2024, with focus on undetected shellcode loader.
https://blog.deeb.ch/posts/how-edr-works/
EDR functionality and bypasses in 2024, with focus on undetected shellcode loader.
https://blog.deeb.ch/posts/how-edr-works/
👍3