Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Forwarded from Ai000 Cybernetics QLab
In April 2025, the threat actor group named Shadowbits claimed to have breached Hamrahe Avval (MCI), Iran's largest mobile operator, and to have gained access to its database. According to the threat actor, a substantial amount of data belonging to MCI's customers was taken, including full names, father names, place of birth, gender, national ID numbers, addresses, postal codes, birth dates, mobile numbers, and SIM card information.

@aioooir | #hack
Source Byte
i check the breached data it is new :(
hers is detals :

1. 300 MCI employees
(Name and surname, father's name, gender, date of birth, place of birth, ID card, address, province, address, postal code, mobile, plan, email)

2. 300K client name & emails
(customerBriefInfo_custName,indvBrief_email)
🤯7👾2😱1
maybe now they understand they should spend more on security 👀


translation :

In the next 24 hours, we will publish the full information of 80 members of Parliament
😁133🤯1🗿1
Forwarded from Cafe Security (Mohammad)
Problems_Python_Excel.pdf
2.7 MB
Black Hat Asia 2025:
"The Problems of Embedded Python in Excel"
https://github.com/shalomc/bhasia2025
#red_team
#offensive_security
@cafe_security
👍4👎2
Notes for Analysing Malicious PDF Documents
The purpose of this post is to cover steps & tools for analysing malicious PDF documents. I will be using both the FlareVM and REMnux for analysis purposes.
👍74
Forwarded from Cafe Security (Mohammad)
Stuxnet Malware Analysis part1.pdf
886.1 KB
بخش اول مقاله آنالیز بدافزار استاکس نت به زبان فارسی
نویسنده:‌ محمد مهدی انبارکی
@cafe_security
6👍4🗿2👎1
Forwarded from Anastasia 🐞
Any one know the threat actor?
😁2
share here if you know

@Sourc3_Byte_Chat
Leaked pentesting manuals given to Conti ransomware crooks
😁5🥰2
Forwarded from /mdre/
🐙 talks
Notes from the recent OnlyMalware event on "Sryxen Stealer" source code analysis are available on GitHub.

We explore how they steal info for:
- browser cookies, autofill, bookmarks, passwords, history
- socials
- games
- VPNs, wallets, and more.
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3
😁6🥰1🤔1
🔥2
Forwarded from 1N73LL1G3NC3
LsassHijackingViaReg

Injecting a DLL into lsass.exe by editing a registry key value.
🔥6👍43