Source Byte – Telegram
Source Byte
7.73K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Source Byte pinned a file
ArvinClub has been active for a while

https://news.1rj.ru/str/arvinclub3

They done cool things
Such as finding BlackReward onion website IP
DDOS on mojahedin khalq
And also not cool things like ransom companies 👀
3👍2
Forwarded from ARVIN
i found this stealer developer
This individual executed the stealer on their own device for testing purposes. Here, we are sharing the logs from the developer system.
Forwarded from ARVIN
And now the developer identity is revealed.
https://by.linkedin.com/in/hady-asmar-414489136
1
may be useful
might be related to bank melli current breach 🤷🏻‍♂️


Fact or lie? A superficial review of the latest attack on the National Bank server
( mail[.]sadad[.]co[.]ir , mail[.]bmi[.]ir , mail[.]mail2[.]bmi[.]ir )
https://web.archive.org/web/20221103094525/https://aptiran.github.io/CENTER/
👍4
We should not be happy by every r ocket we fire
and we should not be sad by every r ocket hit us


Iran fight 8 years in this period Iran done around 25 large operations but only 30-40 % of them succeeded , at the end we won because saddam did not take our lands

This gonna be long war .... stay ahead and be patient
34👎14👍9
👀

BTC wallet ?
😁10👎3🤔2👏1😱1
Forwarded from CyberSecurityTechnologies (-CST-)
#reversing
Windows Inter Process Communication:
A Deep Dive Beyond the Surface

Part 1 - IPC Roadmap
Part 2 - RPC Architecture Overview
Part 3 - Handles and binding
Part 4 - RPC Security
🔥93👍2👏2
MacOS hacking part 2: classic injection trick into macOS applications. Simple C example by cocomelonc

#APT34 (aka OILRIG) is known to use code injection techniques to interact with macOS and Linux systems, leveraging vulnerabilities and weaknesses in the system’s security mechanisms to inject code into running processes.

#APT10 (aka Red Apollo), another advanced Chinese group, has been known to use techniques like process injection and DLL hijacking to manipulate and monitor systems. This is conceptually similar to DYLD_INSERT_LIBRARIES because it involves injecting malicious code into existing applications.
9
TrollBlacklistDLL
Reads blacklist.txt and blocks dlls from loading with option to unblock subsequently. Patches LdrLoadDll in local/remote process to return dll not found.
7👎1🤔1🤯1
Emerging Threat - Mommy - 27 June 2025.pdf
688.6 KB
Emerging Threat - Mommy - 27 June 2025.pdf
5
DPAPI exploitation during pentest
and password cracking


https://www.synacktiv.com/ressources/univershell_2017_dpapi.pdf
👍4
Forwarded from APT IRAN مرکز تحقیقاتی
Silent-Trigger.zip
3.8 MB
ما انتشار این سند را ضربه‌ای بنیادین به یکی از پروژه‌های راهبردی و گسترده رژیم صهیونیستی در داخل ایران می‌دانیم.
افشای این الگوی عملیاتی می‌تواند مسیر جدیدی در تحلیل‌ تهدیدات سایبری مبتنی بر نفوذ سخت‌افزاری ایجاد کند و لازم است این الگو در بررسی‌های آتی به‌عنوان یک چارچوب مرجع مورد استفاده و پیگیری قرار گیرد.
🔥7😁4🗿2👍1
Сеть «Iran Hayom» публикует антиизраильскую пропаганду на иврите и английском языке в X , Instagram , TikTok , Telegram и YouTube .

Ее название является игрой слов на популярной израильской газете Israel Hayom , которая публикуется на иврите на israelhayom[.]co[.]il и чей английский веб-сайт israelhayom[.]com . Логотип Iran Hayom даже заимствует элементы дизайна из Israel Hayom .

https://www.fdd.org/analysis/2025/07/01/fdd-connects-anti-israel-network-on-social-media-to-iranian-website-pro-regime-actor/
🗿42
RedCanary_TD_2025.pdf
2.9 MB
"Red Canary Threat Detection Report:
Techniques, Trends, & Takeaways",  2025.
Source Byte
sepah bank.png
this report is bullshit or is related to past incidents (attacker targeted storage itself directly)

here is statement of the Datin company :

(source : https://www.dotin.ir/dotin-actions-with-banks-recent-cyberattack/)
👾21👍1
Demystifying Firmware Blobs in Linux
Posted Jul 5, 2025 Updated Jul 5, 2025
By Iman Seyed


Most Linux systems rely on binary blobs to activate the full capabilities of hardware like Bluetooth and Wi-Fi chips. But what are these blobs, and how does the kernel load them?
🔥21
Forwarded from SoheilSec (Soheil)
RTO.pdf
96.2 KB
دوره RTO
شروع دوره 17 مرداد مدت زمان دوره در 4 جلسه 8 ساعته که کلا 32 ساعت روزهای برگزاری جمعه ها 8 تا 16
دوره به صورت آنلاین می‌باشد. در صورتی که سرفصل تکمیل نشود تایم اضافه خواهد شد.
دوره به صورت عملی با سناریو شبیه سازی APT بر روی LAB شخصی سازی شده می‌باشد.
سرفصل ضمیمه شد هر روز شامل چندین موضوع می‌باشد که همراه با حل تمرین در لب می‌باشد.
قیمت دوره 15 تومن
نمونه تدریس
https://www.youtube.com/@soheilsec/playlists

سوال در مورد دوره @soheilsec
4