Source Byte – Telegram
Source Byte
7.74K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Forwarded from vx-underground
Schools need to stop teaching kids malware is like, 'trojans', and 'worms', etc. It's not 1996 anymore.

New malware types:
- Ransomware
- Loaders
- Information Stealers
- Piles of shit that doesn't work
- RATs
🤣11😁2👾1
Bear C2 is a compilation of C2 noscripts, payloads, and stagers used in simulated attacks by Russian APT groups
Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA and ChaCha to secure communication between the payload and the operator machine.
GitHub

#c2
👍3👾1
RedTeam Workshop - Part 3
APT38 attacks simulation
Execution
+ T1059.001 | PowerShell
+ T1059.003 | Windows Command Shell
+ T1059.005 | Visual Basic
+ T1106 | Native API
+ T1053.005 | Scheduled Task
+ T1569.002 | Service Execution
+ T1024.002 | Malicious File
Persistence
+ T1543.003 | Windows Service

https://www.youtube.com/watch?v=XjeIPE4g33s
slides / notes :
https://github.com/soheilsec/RT-workshop-2024

credit : @soheilsec
language : persian
🔥7👎2👾1
Forwarded from APT
⚙️From COM Object Fundamentals To UAC Bypasses

A 25-minute crash course covering Tokens, Privileges, UAC, COM, and ultimately bypassing UAC.

🔗Research:
https://www.youtube.com/watch?v=481SI_HWlLs

🔗Source:
https://github.com/tijme/conferences/tree/master/2024-09%20OrangeCon/code

#windows #com #uac #bypass
👍54👎1👾1
Forwarded from Peneter Tools (Soheil Hashemi)
👍6👾2
Forwarded from iCe 𖤍
The changes to the IDAPython API in IDA 9 has broken some plugins and noscripts

Here's how to fix some of these issues:

https://blog.junron.dev/IDAPython%20Research/IDAPython%208%20to%209.html
👍4
Memo230_IranianCyberThreat_ENG_digital.pdf
1.8 MB
Iranian Cyber Threat _ENG_ 2024


#cyber_threat #report #apt
🔥5👍3👾1
Iran_Cyber_Threat-Final_.pdf
489.4 KB
Iran Cyber Threat Final
به‌ زبان فارسی
👍7🤣3
👍3
Forwarded from Offensive Xwitter
😈 [ Kurosh Dabbagh @_Kudaes_ ]

Somebody asked if you can run a dll directly without rundll32 as you would do with an exe. You just need to remove the IMAGE_FILE_DLL flag from IMAGE_FILE_HEADER->Characteristics, which can be done with the option -e. Don't see much use for it tho ^^

🔗 https://github.com/Kudaes/CustomEntryPoint

🐥 [ tweet ]
👍32
CreateSvcRpc
A custom RPC client to execute programs as the SYSTEM user


https://www.x86matthew.com/view_post?id=create_svc_rpc

#RPC
👍11