tiivik️
This tool connects to the Telegram API and scans messages in specified groups or channels to extract and collect:
Telegram usernames (@username)
Email addresses
Phone numbers
All extracted data is saved to a CSV file for easy access and further processing.
Telegram usernames (@username)
Email addresses
Phone numbers
All extracted data is saved to a CSV file for easy access and further processing.
Source Byte
This tool connects to the Telegram API and scans messages in specified groups or channels to extract and collect: Telegram usernames (@username) Email addresses Phone numbers All extracted data is saved to a CSV file for easy access and further processing.
useful for leveraging your TI feeds
❤6👍1😁1
ScriptBlock Smuggling:
Spoofing PowerShell Security Logs and Bypassing AMSI Without Reflection or Patching
Spoofing PowerShell Security Logs and Bypassing AMSI Without Reflection or Patching
❤1👍1
what is Windows software trace preprocessor (WPP)?
MSDN
Data Source Analysis and Dynamic Windows RE using WPP and TraceLogging
MSDN
Data Source Analysis and Dynamic Windows RE using WPP and TraceLogging
👍2🔥2
AMSI Write Raid Bypass Vulnerability
bypass AMSI without the VirtualProtect API and without changing memory protection
bypass AMSI without the VirtualProtect API and without changing memory protection
👍3
Forwarded from Infosec Fortress
Doyensec
!exploitable Episode Two - Enter the Matrix
In case you are just tuning in, Doyensec has found themselves on a cruse ship touring the Mediterranean. Unwinding, hanging out with colleagues and having some fun. Part 1 covered our journey into IoT ARM exploitation, while our next blog post, coming in…
🔥3❤2👍2
Forwarded from Infosec Fortress
🌸✨ Happy Nowruz! ✨🌸
Wishing everyone a bright and joyful Nowruz filled with fresh beginnings, happiness, and success! 🌱🔥 May this new year bring you and your loved ones health, prosperity, and countless moments of peace and celebration.
#Nowruz
#Iranian_New_Year
Wishing everyone a bright and joyful Nowruz filled with fresh beginnings, happiness, and success! 🌱🔥 May this new year bring you and your loved ones health, prosperity, and countless moments of peace and celebration.
#Nowruz
#Iranian_New_Year
❤5👍2
Infosec Fortress
🌸✨ Happy Nowruz! ✨🌸 Wishing everyone a bright and joyful Nowruz filled with fresh beginnings, happiness, and success! 🌱🔥 May this new year bring you and your loved ones health, prosperity, and countless moments of peace and celebration. #Nowruz #Iranian_New_Year
Too lazy to write my own 👀
404 not found LOL 😂😂
(this year is 1404 if you don't get it there isn't any problem)
404 not found LOL 😂😂
❤6😁3🔥2👍1
Forwarded from Будни манипулятора
OSINT_современные_технологии.pdf
1.6 MB
Про OSINT и вокруг него
❤4👍1👎1
Будни манипулятора
OSINT_современные_технологии.pdf
I wish I know Russian
But Google translate document translation is fine
But Google translate document translation is fine
😁7🤯2👍1
Bypass Windows Defender
Attack Surface Reduction
https://blog.sevagas.com/IMG/pdf/bypass_windows_defender_attack_surface_reduction.pdf
Attack Surface Reduction
https://blog.sevagas.com/IMG/pdf/bypass_windows_defender_attack_surface_reduction.pdf
❤3👍3
Source Byte
Bypass Windows Defender Attack Surface Reduction https://blog.sevagas.com/IMG/pdf/bypass_windows_defender_attack_surface_reduction.pdf
Red-Blue Confrontation - Office ASR Bypass
https://ring0rl.github.io/posts/%E7%BA%A2%E8%93%9D%E5%AF%B9%E6%8A%97-office-ASR-Bypass/
https://ring0rl.github.io/posts/%E7%BA%A2%E8%93%9D%E5%AF%B9%E6%8A%97-office-ASR-Bypass/
二两’s Blog
红蓝对抗-Office ASR Bypass
0X00 什么是ASR
👍3🔥3
[MS-SHLLINK].pdf
1.8 MB
Windows LNK - structure
Analysis
- https://zeifan.my/Windows-LNK
- https://u0041.co/posts/articals/lnk-files-artifact/
Analysis
- https://zeifan.my/Windows-LNK
- https://u0041.co/posts/articals/lnk-files-artifact/
👍2
Source Byte
https://unit42.paloaltonetworks.com/stately-taurus-attacks-se-asian-government/
while reviewing sans CTI summit 2025 i see this interesting talk : "Advanced Threat Research Methodologies: Unraveling a Triple-APT Intrusion" . (by Tom Fakterman & Lior Rochberger )
which they discuss above attack 👀 and how did they cluster this attack
don't miss it
which they discuss above attack 👀 and how did they cluster this attack
don't miss it
Forwarded from Investigations by ZachXBT
I regularly have people ask me about tools I use in my investigations so here’s a comprehensive list:
Cielo - Wallet Tracking (EVM, Bitcoin, Solana, Tron, etc)
TRM - Create graphs for addresses/transactions
MetaSuites - Chrome extension that adds additional data on block explorers
OSINT Industries - email/username/phone lookups
LeakPeek - db lookups
Snusbase - db lookups
Intelx - db lookups
Spur - IP lookups
Cavalier (Hudson Rock) - Infostealer lookups
Impersonator - Chrome extension to spoof login to dApps
MetaSleuth - Similiar to TRM but intended for retail users
Arkham - Multichain block explorer, entity labels, create graphs, alerts
Obsidian - Create flow charts / diagrams
Wayback Machine - archive web pages
Archive Today - archive web pages
Etherscan/Solscan - block explorer for EVM / Solana
Blockchair - bitcoin block explorer
Range - CCTP bridge explorer
Pulsy - bridge explorer aggregator
Socketscan - EVM bridge explorer
Dune - Analytics platform to query blockchain data
Mugetsu - X/Twitter username history & meme coin lookups
TelegramDB Search Bot - Basic Telegram OSINT
Discord[.]ID - Basic Discord account info
CryptoTaxCalculator -Track PNL for an address
Note: I am not paid by these platforms to mention them and do not have referral links to share
Cielo - Wallet Tracking (EVM, Bitcoin, Solana, Tron, etc)
TRM - Create graphs for addresses/transactions
MetaSuites - Chrome extension that adds additional data on block explorers
OSINT Industries - email/username/phone lookups
LeakPeek - db lookups
Snusbase - db lookups
Intelx - db lookups
Spur - IP lookups
Cavalier (Hudson Rock) - Infostealer lookups
Impersonator - Chrome extension to spoof login to dApps
MetaSleuth - Similiar to TRM but intended for retail users
Arkham - Multichain block explorer, entity labels, create graphs, alerts
Obsidian - Create flow charts / diagrams
Wayback Machine - archive web pages
Archive Today - archive web pages
Etherscan/Solscan - block explorer for EVM / Solana
Blockchair - bitcoin block explorer
Range - CCTP bridge explorer
Pulsy - bridge explorer aggregator
Socketscan - EVM bridge explorer
Dune - Analytics platform to query blockchain data
Mugetsu - X/Twitter username history & meme coin lookups
TelegramDB Search Bot - Basic Telegram OSINT
Discord[.]ID - Basic Discord account info
CryptoTaxCalculator -Track PNL for an address
Note: I am not paid by these platforms to mention them and do not have referral links to share
👍7
Forwarded from SoheilSec (Soheil)
دیدم از افتا تشکر کردن بعد یک عمر یک گزارش داده ولی گویا افتا رولهای کسپر دزدیده ریپلیس کرده اسم خودش گذاشته! خدایی اونجا یکتون بلد نیستید یارا رول بنویسه🤔
😁18🗿2😱1
Astral-PE is a low-level mutator (headers obfuscator and patcher) for Windows PE files (.exe, .dll) that rewrites structural metadata after protection — without breaking execution.
It does not pack, encrypt or inject. Instead, it mutates low-hanging but critical structures like timestamps, headers, section flags, debug info, import/export names, and more.
It does not pack, encrypt or inject. Instead, it mutates low-hanging but critical structures like timestamps, headers, section flags, debug info, import/export names, and more.
❤3👍2
Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup
👍1🔥1