Source Byte – Telegram
Source Byte
7.76K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
PowerShellHttpServer.psm1
6.3 KB
With thanks to ZH54321
👍4
Database Viewer and Exporter
This is a Python tool for viewing and exporting data from various databases and JSON files. It supports SQLite, MySQL, PostgreSQL, MSSQL, and JSON files. Users can also export query results in CSV or JSON formats. The tool is designed to handle encrypted data using multiple encryption algorithms and can decrypt data that has been encrypted with a combination of algorithms.


https://github.com/MrAmirRezaie/readDatabase
GoDefender
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.


https://github.com/EvilBytecode/GoDefender.git
New blog on using CLR customizations to improve the OPSEC of your .NET execution harness. This includes a novel AMSI bypass that identified by author in 2023. By taking control of CLR assembly loads, we can load assemblies from memory with no AMSI scan.

https://securityintelligence.com/x-force/being-a-good-clr-host-modernizing-offensive-net-tradecraft/

Proof-of-concept for the AMSI bypass and an implementation of a CLR memory manager is on GitHub. We can implement custom memory routines and track all allocations made by the CLR.

https://github.com/passthehashbrowns/Being-A-Good-CLR-Host

#redteam #net #clr
👍1
Forwarded from /mdre/
👍1💔1
Forwarded from [ deprecated_bytes ]
#reverse #IDA #hardware #research

.noscript
Mouse Adventures

.text
Wherein I delve into the internals of my no-name brand "Tecknet Hypertrak Gaming Mouse" in an attempt to write a cross-platform tool that can manipulate its configuration without having to use the awful Windows-only tool it's shipped with. In this first part we tear apart said tool to figure out how it communicates with the mouse.

.comment
Practical field story about "simple" hardware reverse engineering. Part 7 is noticeable as rare info about IDA's processor module creation.


.data
#1: Introduction
#2: Extracting the Firmware
#3: Writing a Disassembler
#4: Writing a custom tool
#5: Dumping and Parsing the USB Denoscriptors
#6: Enabling the Bootloader
#7: Writing an IDA Processor Module
#8: Dissecting the USB Code and Unbricking the Mouse

[ deprecated_bytes ]
3👍1
2
we lost our previous group :(
have no idea why , telegram is so strange
💔263