Forwarded from Threathunting (Pouyan Zamani)
❤2👍1
Forwarded from /mdre/
Notes from the recent OnlyMalware event on "Sryxen Stealer" source code analysis are available on GitHub.
We explore how they steal info for:
- browser cookies, autofill, bookmarks, passwords, history
- socials
- games
- VPNs, wallets, and more.
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3
Cisco IOS XE CVE-2023-20198 and CVE-2023-20273: WebUI Internals, Patch Diffs, and Theory Crafting
https://web.archive.org/web/20231102055645/https://www.horizon3.ai/cisco-ios-xe-cve-2023-20198-theory-crafting/
Cisco IOS XE CVE-2023-20198: Deep Dive and POC
https://web.archive.org/web/20231104121118/https://horizon3.ai/cisco-ios-xe-cve-2023-20198-deep-dive-and-poc/
https://web.archive.org/web/20231102055645/https://www.horizon3.ai/cisco-ios-xe-cve-2023-20198-theory-crafting/
Cisco IOS XE CVE-2023-20198: Deep Dive and POC
https://web.archive.org/web/20231104121118/https://horizon3.ai/cisco-ios-xe-cve-2023-20198-deep-dive-and-poc/
🔥2
Unity of Hacktivist Fronts: Iranian Cyber-Enabled IO Targeting Israel
https://m.youtube.com/watch?v=jQKEYyVB8Pk#
https://m.youtube.com/watch?v=jQKEYyVB8Pk#
👾4❤2👍2
Exploring dsreg Part 1
(I have no idea what i’m doing)
Hello! In this posts series you will join me in my very random research, where I’ll try to RE dsreg.dll and learn its functionalities (:
https://sapirxfed.com/2025/04/28/exploring-dsreg-part-1/
(I have no idea what i’m doing)
Hello! In this posts series you will join me in my very random research, where I’ll try to RE dsreg.dll and learn its functionalities (:
https://sapirxfed.com/2025/04/28/exploring-dsreg-part-1/
👍2
APTSimulator: A powerful APT simulation attack tool
A toolset to make a system look as if it was the victim of an APT attack
A toolset to make a system look as if it was the victim of an APT attack
👍5
Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware
😁6😱2
Forwarded from Infosec Fortress
YouTube
Windows Heap-backed Pool: The Good, the Bad, and the Encoded
For decades, the Windows kernel pool remained the same, using simple structures that were easy to read, parse and search for, but recently this all changed, with a new and complex design that breaks assumptions and exploits, and of course, tools and debugger…
Windows Heap-backed Pool: The Good, the Bad, and the Encoded
📹 Video
#windows
#heap
#conference
———
🆔 @Infosec_Fortress
📹 Video
#windows
#heap
#conference
———
🆔 @Infosec_Fortress
❤3👍1
CRACKEDCANTIL: A MALWARE SYMPHONY DELIVERED
BY CRACKED SOFTWARE; PERFORMED BY LOADERS,
INFOSTEALERS, RANSOMWARE, ET AL.
https://www.virusbulletin.com/uploads/pdf/conference/vb2024/papers/CrackedCantil-a-malware-symphony-delivered-by-cracked-software-performed-by-loaders-infostealers-ransomware-et-al.pdf
[ 00 ] slides
[ 01 ] paper
BY CRACKED SOFTWARE; PERFORMED BY LOADERS,
INFOSTEALERS, RANSOMWARE, ET AL.
https://www.virusbulletin.com/uploads/pdf/conference/vb2024/papers/CrackedCantil-a-malware-symphony-delivered-by-cracked-software-performed-by-loaders-infostealers-ransomware-et-al.pdf
[ 00 ] slides
[ 01 ] paper
👾3