Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Forwarded from APT
⚙️From COM Object Fundamentals To UAC Bypasses

A 25-minute crash course covering Tokens, Privileges, UAC, COM, and ultimately bypassing UAC.

🔗Research:
https://www.youtube.com/watch?v=481SI_HWlLs

🔗Source:
https://github.com/tijme/conferences/tree/master/2024-09%20OrangeCon/code

#windows #com #uac #bypass
👍54👎1👾1
Forwarded from Peneter Tools (Soheil Hashemi)
👍6👾2
Forwarded from iCe 𖤍
The changes to the IDAPython API in IDA 9 has broken some plugins and noscripts

Here's how to fix some of these issues:

https://blog.junron.dev/IDAPython%20Research/IDAPython%208%20to%209.html
👍4
Memo230_IranianCyberThreat_ENG_digital.pdf
1.8 MB
Iranian Cyber Threat _ENG_ 2024


#cyber_threat #report #apt
🔥5👍3👾1
Iran_Cyber_Threat-Final_.pdf
489.4 KB
Iran Cyber Threat Final
به‌ زبان فارسی
👍7🤣3
👍3
Forwarded from Offensive Xwitter
😈 [ Kurosh Dabbagh @_Kudaes_ ]

Somebody asked if you can run a dll directly without rundll32 as you would do with an exe. You just need to remove the IMAGE_FILE_DLL flag from IMAGE_FILE_HEADER->Characteristics, which can be done with the option -e. Don't see much use for it tho ^^

🔗 https://github.com/Kudaes/CustomEntryPoint

🐥 [ tweet ]
👍32
CreateSvcRpc
A custom RPC client to execute programs as the SYSTEM user


https://www.x86matthew.com/view_post?id=create_svc_rpc

#RPC
👍11
تبریک !
Congratulations to the Iran WorldSkills Cyber Security Team!
💎

Your dedication, hard work, and exceptional skills have truly paid off. Competing on the world stage and showcasing your talents in cyber security is a remarkable achievement. Your success not only brings pride to our nation but also inspires future generations of cyber security enthusiasts. Keep pushing the boundaries and setting new standards of excellence. We are incredibly proud of you!


https://results.worldskills.org/results?offset=0&base_skill=546
1🍾15🏆73👍21🤡1
HijackFileHandle -
Hijack a file in a remote process without code injection
In three language 😂

https://web.archive.org/web/20220802125038/https://www.x86matthew.com/view_post?id=hijack_file_handle


[翻译]HijackFileHandle - 在不注入代码的情况下劫持一个远程进程的文件
https://bbs.kanxue.com/thread-271445-1.htm

Взлом дескрипторов в Windows с помощью Handle Hijacking
https://spy-soft.net/handle-hijacking/

#malware_dev
2
Source Byte pinned a photo