Source Byte – Telegram
Source Byte
7.76K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
https://xss.is/threads/125480/
Operation Chamilo (e-learn cms) while red team
2
https://amsi.fail
AMSI.fail generates obfuscated PowerShell snippets that break or disable AMSI for the current process
💩3👾2🔥1
Analyze cyber reconnaissance activities behind APT37 threats https://www.genians.co.kr/blog/threat_intelligence/apt37_recon
👍2
Forwarded from Ai000 Cybernetics QLab
👍862👎1
Memory Management - Part 1: Virtual memory and Paging concepts
https://blog.reodus.com/posts/memory-management-part1/

credits : Amir M. Jahangirzad
6
Forwarded from Go Casts 🚀
دنبال یه سری منبع در مورد golang internals بودم که با این repository آشنا شدم، به صورت موضوعی لینک های خوبی رو معرفی کرده، دوست داشتید بررسی کنید.

A collection of articles and videos to understand Golang internals.
https://github.com/emluque/golang-internals-resources

@gocasts
👍1
Forwarded from Cyber Detective
Wayback Machine collection search

twitter.com/BanPangar shared a method for finding emails/nicknames mentions in the text of web pages/docs with archive.org collection search. Help find a lot of things that don't show up in Google results.

Don't forget the quotes.

#osint
Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures https://www.vergiliusproject.com/
9👍5❤‍🔥2
6
COM Object - Part 1
Confirm the concept of COM objects through practice and Check how to find a vulnerable COM object.

https://hackyboiz.github.io/2024/11/24/ogu123/COM_Object/
👍2🖕1
How to Investigate Insider Threats (Forensic Methodology)
https://www.inversecos.com/2022/10/how-to-investigate-insider-threats.html

Find their #ttp
👍3