Forwarded from Сводки частной разведки
ta-2023-0601.pdf
2.9 MB
The People’s Liberation Army (PLA) is using new collection, processing, and analysis technologies to exploit the massive amount of open-source information available from the internet and other sources for military intelligence purposes. A growing ecosystem of private companies, state-owned enterprises, state-run research organizations, and universities is supporting the PLA’s push to leverage open-source intelligence (OSINT) by providing research services, platforms, and data. China’s military and defense industries are using automated web crawlers, algorithms, machine learning, artificial intelligence, and other tools to extract intelligence from foreign governments, militaries, social media platforms, news media organizations, companies, research organizations, and individuals. The PLA very likely employs OSINT alongside other, more sensitive forms of intelligence to support decision-making at the strategic, operational, and tactical levels. The PLA’s use of OSINT very likely provides it an intelligence advantage, as the West’s open information environment allows the PLA to easily harvest large quantities of open-source data, whereas Western militaries must contend with China’s closed
information environment. This report offers an overview of Chinese views on military OSINT, details how the PLA applies and collects OSINT, and profiles several private companies that provide OSINT to the PLA.
Источник: @freedomf0x
Please open Telegram to view this post
VIEW IN TELEGRAM
FromaCprojectthroughassemblytoshellcodeHasherezade.pdf
1.3 MB
FromaCprojectthroughassemblytoshellcodeHasherezade.pdf
Forwarded from tiivik️
🆔@tiivik
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4
tiivik️
This tool connects to the Telegram API and scans messages in specified groups or channels to extract and collect:
Telegram usernames (@username)
Email addresses
Phone numbers
All extracted data is saved to a CSV file for easy access and further processing.
Telegram usernames (@username)
Email addresses
Phone numbers
All extracted data is saved to a CSV file for easy access and further processing.
Source Byte
This tool connects to the Telegram API and scans messages in specified groups or channels to extract and collect: Telegram usernames (@username) Email addresses Phone numbers All extracted data is saved to a CSV file for easy access and further processing.
useful for leveraging your TI feeds
❤6👍1😁1
ScriptBlock Smuggling:
Spoofing PowerShell Security Logs and Bypassing AMSI Without Reflection or Patching
Spoofing PowerShell Security Logs and Bypassing AMSI Without Reflection or Patching
❤1👍1
what is Windows software trace preprocessor (WPP)?
MSDN
Data Source Analysis and Dynamic Windows RE using WPP and TraceLogging
MSDN
Data Source Analysis and Dynamic Windows RE using WPP and TraceLogging
👍2🔥2
AMSI Write Raid Bypass Vulnerability
bypass AMSI without the VirtualProtect API and without changing memory protection
bypass AMSI without the VirtualProtect API and without changing memory protection
👍3
Forwarded from Infosec Fortress
Doyensec
!exploitable Episode Two - Enter the Matrix
In case you are just tuning in, Doyensec has found themselves on a cruse ship touring the Mediterranean. Unwinding, hanging out with colleagues and having some fun. Part 1 covered our journey into IoT ARM exploitation, while our next blog post, coming in…
🔥3❤2👍2
Forwarded from Infosec Fortress
🌸✨ Happy Nowruz! ✨🌸
Wishing everyone a bright and joyful Nowruz filled with fresh beginnings, happiness, and success! 🌱🔥 May this new year bring you and your loved ones health, prosperity, and countless moments of peace and celebration.
#Nowruz
#Iranian_New_Year
Wishing everyone a bright and joyful Nowruz filled with fresh beginnings, happiness, and success! 🌱🔥 May this new year bring you and your loved ones health, prosperity, and countless moments of peace and celebration.
#Nowruz
#Iranian_New_Year
❤5👍2
Infosec Fortress
🌸✨ Happy Nowruz! ✨🌸 Wishing everyone a bright and joyful Nowruz filled with fresh beginnings, happiness, and success! 🌱🔥 May this new year bring you and your loved ones health, prosperity, and countless moments of peace and celebration. #Nowruz #Iranian_New_Year
Too lazy to write my own 👀
404 not found LOL 😂😂
(this year is 1404 if you don't get it there isn't any problem)
404 not found LOL 😂😂
❤6😁3🔥2👍1
Forwarded from Будни манипулятора
OSINT_современные_технологии.pdf
1.6 MB
Про OSINT и вокруг него
❤4👍1👎1
Будни манипулятора
OSINT_современные_технологии.pdf
I wish I know Russian
But Google translate document translation is fine
But Google translate document translation is fine
😁7🤯2👍1
Bypass Windows Defender
Attack Surface Reduction
https://blog.sevagas.com/IMG/pdf/bypass_windows_defender_attack_surface_reduction.pdf
Attack Surface Reduction
https://blog.sevagas.com/IMG/pdf/bypass_windows_defender_attack_surface_reduction.pdf
❤3👍3
Source Byte
Bypass Windows Defender Attack Surface Reduction https://blog.sevagas.com/IMG/pdf/bypass_windows_defender_attack_surface_reduction.pdf
Red-Blue Confrontation - Office ASR Bypass
https://ring0rl.github.io/posts/%E7%BA%A2%E8%93%9D%E5%AF%B9%E6%8A%97-office-ASR-Bypass/
https://ring0rl.github.io/posts/%E7%BA%A2%E8%93%9D%E5%AF%B9%E6%8A%97-office-ASR-Bypass/
二两’s Blog
红蓝对抗-Office ASR Bypass
0X00 什么是ASR
👍3🔥3
[MS-SHLLINK].pdf
1.8 MB
Windows LNK - structure
Analysis
- https://zeifan.my/Windows-LNK
- https://u0041.co/posts/articals/lnk-files-artifact/
Analysis
- https://zeifan.my/Windows-LNK
- https://u0041.co/posts/articals/lnk-files-artifact/
👍2