Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Forwarded from Anastasia 🐞
Any one know the threat actor?
😁2
share here if you know

@Sourc3_Byte_Chat
Leaked pentesting manuals given to Conti ransomware crooks
😁5🥰2
Forwarded from /mdre/
🐙 talks
Notes from the recent OnlyMalware event on "Sryxen Stealer" source code analysis are available on GitHub.

We explore how they steal info for:
- browser cookies, autofill, bookmarks, passwords, history
- socials
- games
- VPNs, wallets, and more.
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3
😁6🥰1🤔1
🔥2
Forwarded from 1N73LL1G3NC3
LsassHijackingViaReg

Injecting a DLL into lsass.exe by editing a registry key value.
🔥6👍43
Unity of Hacktivist Fronts: Iranian Cyber-Enabled IO Targeting Israel

https://m.youtube.com/watch?v=jQKEYyVB8Pk#
👾42👍2
Exploring dsreg Part 1
(I have no idea what i’m doing)

Hello! In this posts series you will join me in my very random research, where I’ll try to RE dsreg.dll and learn its functionalities (:

https://sapirxfed.com/2025/04/28/exploring-dsreg-part-1/
👍2
APTSimulator: A powerful APT simulation attack tool

A toolset to make a system look as if it was the victim of an APT attack
👍5
Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware
😁6😱2
CRACKEDCANTIL: A MALWARE SYMPHONY DELIVERED
BY CRACKED SOFTWARE; PERFORMED BY LOADERS,
INFOSTEALERS, RANSOMWARE, ET AL.

https://www.virusbulletin.com/uploads/pdf/conference/vb2024/papers/CrackedCantil-a-malware-symphony-delivered-by-cracked-software-performed-by-loaders-infostealers-ransomware-et-al.pdf




[ 00 ] slides
[ 01 ] paper
👾3
Audio
🔴 این روزها احتمالا خبر اضافه شدن زبان فارسی به NotebookLM رو شندید که امکان ساخت پادکست و خلاصه صوتی رو میده.

برای تستش ارائه ی خانم Valentina Palmiotti با عنوان "The Exploit Development Life Cycle: From Concept to Compromise" در کنفرانس BSides Canberra 2024 رو دادم و نتیجه رو میتونید گوش بدید.

موقعی که خیلی از ما شروع به یادگیری امنیت سایبری کرده بودیم این امکانات نبود، الانم که یادگیری ساده شده، مشکل برق و اینترنت داریم.

#توسعه_اکسپلویت #تیم_قرمز #کشف_آسیب_پذیری #تحقیقات_آسیب‌پذیری
#exploitdev #vulnerability #redteam #vulnerabilityResearch

🆔 @onhex_ir
➡️ ALL Link
👍5🤯2😁1
CoffLoader
Introduction
Portable Executable (PE)
Store data in a PE
Reference to functions and variables during execution
Object files
Overview
Coff Loader
BOF or COFF ?
BOF advantages
BOF disadvantage
Hands on : COFF Loader
Blueprint
COFF specification
COFF Header
Sections Header
Navigate into sections
Relocations Table
Absolute and Relative address
Symbol Table
Symbol Table String
Conclusion
Write sections in memory
Perform relocations
Special symbol
Standard symbol relocation
Put things altogether
Run the code
Upgrade
Compatibility with CobaltStrike BOF
CobaltStrike BOF specificities
Add support for beacon internal functions
Format parameters for CobalStrike BOF
Dynamic .got and .bss
Conclusion
Ressources
External contribution
3🔥1