https://github.com/anonymous300502/Nuke-AMSI
NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.
#redteam
NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.
#redteam
GitHub
GitHub - anonymous300502/Nuke-AMSI: NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in…
NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments. - anonymous300502/Nuke-AMSI
💩2👾1
Forwarded from Telegram
Please note that our moderators had to block the following messages in your channel @Source_byte due to copyright infringement: https://news.1rj.ru/str/c/1725697372/1366 https://news.1rj.ru/str/c/1725697372/1657 https://news.1rj.ru/str/c/1725697372/1658 https://news.1rj.ru/str/c/1725697372/1873 https://news.1rj.ru/str/c/1725697372/1825 https://news.1rj.ru/str/c/1725697372/1666 https://news.1rj.ru/str/c/1725697372/1667 https://news.1rj.ru/str/c/1725697372/1668 https://news.1rj.ru/str/c/1725697372/1669 https://news.1rj.ru/str/c/1725697372/1670 https://news.1rj.ru/str/c/1725697372/1671 https://news.1rj.ru/str/c/1725697372/1672 https://news.1rj.ru/str/c/1725697372/1673 https://news.1rj.ru/str/c/1725697372/1674
👍2🤔2👏1👌1
Source Byte
Please note that our moderators had to block the following messages in your channel @Source_byte due to copyright infringement: https://news.1rj.ru/str/c/1725697372/1366 https://news.1rj.ru/str/c/1725697372/1657 https://news.1rj.ru/str/c/1725697372/1658 https://news.1rj.ru/str/c/1725697372/1873 htt…
it seems Maldev academy is angry :(
we just re-share what others leak 👀
have a nice day and don't blame us
we just re-share what others leak 👀
have a nice day and don't blame us
👎4❤3👍1😨1
Analyze cyber reconnaissance activities behind APT37 threats https://www.genians.co.kr/blog/threat_intelligence/apt37_recon
👍2
Memory Management - Part 1: Virtual memory and Paging concepts
https://blog.reodus.com/posts/memory-management-part1/
credits : Amir M. Jahangirzad
https://blog.reodus.com/posts/memory-management-part1/
credits : Amir M. Jahangirzad
❤6
Forwarded from Go Casts 🚀
دنبال یه سری منبع در مورد golang internals بودم که با این repository آشنا شدم، به صورت موضوعی لینک های خوبی رو معرفی کرده، دوست داشتید بررسی کنید.
A collection of articles and videos to understand Golang internals.
https://github.com/emluque/golang-internals-resources
@gocasts
A collection of articles and videos to understand Golang internals.
https://github.com/emluque/golang-internals-resources
@gocasts
GitHub
GitHub - emluque/golang-internals-resources: A collection of articles and videos to understand Golang internals.
A collection of articles and videos to understand Golang internals. - emluque/golang-internals-resources
👍1
Forwarded from Cyber Detective
Wayback Machine collection search
twitter.com/BanPangar shared a method for finding emails/nicknames mentions in the text of web pages/docs with archive.org collection search. Help find a lot of things that don't show up in Google results.
Don't forget the quotes.
#osint
twitter.com/BanPangar shared a method for finding emails/nicknames mentions in the text of web pages/docs with archive.org collection search. Help find a lot of things that don't show up in Google results.
Don't forget the quotes.
#osint
Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures https://www.vergiliusproject.com/
Vergiliusproject
Vergilius Project
Take a look into the depths of Windows kernels and reveal more than 60000 undocumented structures.
❤9👍5❤🔥2
Cyber Threat Intelligence (CTI): A Clear Process for Data Ingestion and Distribution
https://medium.com/@philiphristoff/cyber-threat-intelligence-cti-a-clear-process-for-data-ingestion-and-distribution-1889f6a2c5a8
https://medium.com/@philiphristoff/cyber-threat-intelligence-cti-a-clear-process-for-data-ingestion-and-distribution-1889f6a2c5a8
❤6
COM Object - Part 1
Confirm the concept of COM objects through practice and Check how to find a vulnerable COM object.
https://hackyboiz.github.io/2024/11/24/ogu123/COM_Object/
Confirm the concept of COM objects through practice and Check how to find a vulnerable COM object.
https://hackyboiz.github.io/2024/11/24/ogu123/COM_Object/
👍2🖕1
How to Investigate Insider Threats (Forensic Methodology)
https://www.inversecos.com/2022/10/how-to-investigate-insider-threats.html
https://www.inversecos.com/2022/10/how-to-investigate-insider-threats.html
Find their #ttp
👍3
Forwarded from OnHex
🔴 احتمالا شندید که میگن آنتی ویروسها از طریق یسری امضا (signatures) اقدام به شناسایی بدافزارها میکنن.
در این ویدیو از hoagie hacks دقیقا توضیح میده که منظور از امضاء چیه و آنتی ویروسهایی مانند Microsoft Defender چطوری از اونا برای شناسایی بدافزارها استفاده میکنن.
برای اینکه اینارو نشون بده، یدونه shellcode injection خیلی ساده در ++C پیاده سازی کرده و اومده امضاهایی که منجر به شناسایی بدافزار در Virus Total میشه رو شناسایی و حذف میکنه.
این ویدیوها قراره بصورت مجموعه ارائه بشه و در قسمتهای بعدی تکنیکهای string/API hashing و metamorphic/polymorphic code رو هم پیاده سازی میکنه.
هدف این ویدیوها، بهبود مهارتهای تیم قرمز و آشنایی و دفاع در تیم های آبی هستش.
#تیم_قرمز #تیم_آبی #آنتی_ویروس #توسعه_بدافزار
#redteam #Blueteam #MalwareDev #AV
🆔 @onhex_ir
➡️ ALL Link
در این ویدیو از hoagie hacks دقیقا توضیح میده که منظور از امضاء چیه و آنتی ویروسهایی مانند Microsoft Defender چطوری از اونا برای شناسایی بدافزارها استفاده میکنن.
برای اینکه اینارو نشون بده، یدونه shellcode injection خیلی ساده در ++C پیاده سازی کرده و اومده امضاهایی که منجر به شناسایی بدافزار در Virus Total میشه رو شناسایی و حذف میکنه.
این ویدیوها قراره بصورت مجموعه ارائه بشه و در قسمتهای بعدی تکنیکهای string/API hashing و metamorphic/polymorphic code رو هم پیاده سازی میکنه.
هدف این ویدیوها، بهبود مهارتهای تیم قرمز و آشنایی و دفاع در تیم های آبی هستش.
#تیم_قرمز #تیم_آبی #آنتی_ویروس #توسعه_بدافزار
#redteam #Blueteam #MalwareDev #AV
🆔 @onhex_ir
➡️ ALL Link
👍5👎4
Mimik@tz.pdf
394.6 KB
Mimikatz
https://github.com/gentilkiwi/mimikatz
Mimikatz is an overall software tool used for process manipulation, primarily written in the C programming
language by Mr. Benjamin Deply. This tool enables direct object manipulation and execution via various
techniques. Mimikatz is widely used for bypassing security mechanisms, including EDR (Endpoint Detection
and Response) software and antivirus tools. It has a number of features designed to assist with
penetration testing and exploitation.
https://github.com/gentilkiwi/mimikatz
👍8🔥3👾3