Forwarded from Sec Note
Linkedin
Sec Note | Alireza Hosseini
مدتی بود روی باجافزارها (از نظر سرعت، تکنیکها و روشهای رمزنگاری) مطالعه میکردم. یکی از نکات جالبی که دیدم این بود که تقریباً همه این خانوادهها قبل از رمزگذاری، Shadow Copies و بکاپها رو پاک میکنن.
اما یک سؤال برام پیش اومد: برای حذف بکاپها نیاز…
اما یک سؤال برام پیش اومد: برای حذف بکاپها نیاز…
❤6🔥3
Source Byte
RTTI Internals in MSVC https://www.lukaszlipski.dev/post/rtti-msvc/ #RTTI
Breaking modern software protectors through exploitation
Reverse engineer VMProtect's obfuscator by using its embedded Lua noscripting engine. They recover the original #RTTI information from the obfuscator and get a better understanding of its inner workings.
https://www.youtube.com/live/PAG3M7mWT2c?si=Okhlj2PjXqfue5NU
#vmprotect
source
Reverse engineer VMProtect's obfuscator by using its embedded Lua noscripting engine. They recover the original #RTTI information from the obfuscator and get a better understanding of its inner workings.
https://www.youtube.com/live/PAG3M7mWT2c?si=Okhlj2PjXqfue5NU
#vmprotect
source
❤5
Forwarded from Sec Note
Friday, Aug 22 • 10:00 AM – 12:00 PM
Google Meet joining info
Video call link: https://meet.google.com/ubg-uwrt-mhg
👾19🔥16❤4👎2
Forwarded from Sec Note
This media is not supported in your browser
VIEW IN TELEGRAM
UAC Bypass Chain Leading To Silent Elevation
👾 The Presentation Video
My Blog:
https://binary-win.github.io/2025/08/22/UAC-Bypass.html
👾 The Presentation Video
My Blog:
https://binary-win.github.io/2025/08/22/UAC-Bypass.html
🔥8❤1
Forwarded from Caster
Релиз моей статьи об атаках на IPv6
Caster - Legless (БезногNM)
Genre: Offensive
Label: exploit.org
Release Date: 20 July 2025
Language: English
Performed by: Caster
Written by: Magama Bazarov
Mastered by: Magama Bazarov
Cover Edit: Magama Bazarov
https://blog.exploit.org/caster-legless
Caster - Legless (БезногNM)
Genre: Offensive
Label: exploit.org
Release Date: 20 July 2025
Language: English
Performed by: Caster
Written by: Magama Bazarov
Mastered by: Magama Bazarov
Cover Edit: Magama Bazarov
https://blog.exploit.org/caster-legless
❤3
Forwarded from APT
🛡CreateProcessAsPPL
This is a utility for running processes with Protected Process Light (PPL) protection, enabling bypass of EDR/AV solution defensive mechanisms. It leverages legitimate Windows clipup.exe functionality from System32 to create protected processes that can overwrite antivirus service executable files.
🔗 Source:
https://github.com/2x7EQ13/CreateProcessAsPPL
#av #edr #bypass #ppl
This is a utility for running processes with Protected Process Light (PPL) protection, enabling bypass of EDR/AV solution defensive mechanisms. It leverages legitimate Windows clipup.exe functionality from System32 to create protected processes that can overwrite antivirus service executable files.
🔗 Source:
https://github.com/2x7EQ13/CreateProcessAsPPL
#av #edr #bypass #ppl
❤4
❤1
Forwarded from Anastasia 🐞
❤2
Source Byte
image_2025-08-26_20-26-13.png
these are the best phishing SE i have seen recently🥲
They even trick people to be more confidence with their campaign as they say told the victim which city they are from by their NationalID patterns !
plz share your IoCs in group
sample
They even trick people to be more confidence with their campaign as they say told the victim which city they are from by their NationalID patterns !
plz share your IoCs in group
sample
🤯5❤1
Forwarded from Infosec Fortress (Amir M. Jahangirzad)
Blogspot
From Chrome renderer code exec to kernel with MSG_OOB
Posted by Jann Horn, Google Project Zero Introduction In early June, I was reviewing a new Linux kernel feature when I learned about the...
From Chrome renderer code exec to kernel with MSG_OOB
🔗 Link
#browser
#exploitation
#kernel
#linux
———
🆔 @Infosec_Fortress
🔗 Link
#browser
#exploitation
#kernel
#linux
———
🆔 @Infosec_Fortress
❤3
Forwarded from GitBook - Bug Bounty
zseano Methodology :
https://manutd.notion.site/zseanos-methodology-cool-f1b6ef8d9e8a46af8bee229c1537d150#18b1238c7e2c4c34ab830acb474c5c04
https://manutd.notion.site/zseanos-methodology-cool-f1b6ef8d9e8a46af8bee229c1537d150#18b1238c7e2c4c34ab830acb474c5c04
manutd on Notion
zseanos-methodology-cool | Notion
Source: https://www.bugbountyhunter.com/zseano/
Author X: https://x.com/zseano
Author X: https://x.com/zseano
❤4🗿1
Forwarded from 1N73LL1G3NC3
This media is not supported in your browser
VIEW IN TELEGRAM
During a Red Team engagement, we compromised an AWS account containing a Confluence instance hosted on an EC2 virtual machine. Although we fully compromised the machine hosting the Confluence instance, we did not have valid credentials to log in but were able to interact with the underlying database. This led us to study the structure of the Confluence database and the mechanism for generating API tokens.
P.S. Еще несколько полезных ссылок со старого канала:
📜 Creating a Malicious Atlassian Plugin
🔗 Malfluence
A PoC for a malicious Confluence plugin, which can access all content inside a Confluence instance, access the database directly, and execute arbitrary commands on the underlying Linux server.
📜 Stealing All of the Confluence Things
🔗 Conf-Thief
A Red Team tool for exfiltrating sensitive data from Confluence pages.
🔗 AtlasReaper
A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.
🔗 Jecretz
Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets.
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4👍1
Forwarded from CyberSecurity Shield (Pouyan Zamani)
EPPvsEDRvsXDR.pdf
321.9 KB
یک روز تعطیل که ۶:۳۰ بیدار میشی منجر به تولید #مقاله میشه! یک بار برای همیشه تکلیف epp و edr و xdr رو با هم معلوم کنیم
❤3🗿2
An Undocumented 64-bit Keylogger Targeting Windows Systems
https://github.com/ShadowOpCode/RustMe_Keylogger/blob/main/RustMe%20Keylogger.pdf
https://github.com/ShadowOpCode/RustMe_Keylogger/blob/main/RustMe%20Keylogger.pdf
❤5👍2
Forwarded from ARVIN
NEW RESEARCH: How $81M vanished from Iran's largest crypto exchange
https://akatsukilegion.netlify.app/nobitex_breach-2025
https://akatsukilegion.netlify.app/nobitex_breach-2025
akatsukilegion.netlify.app
When the Bazaar Burned From Within: The Silent Breach of Nobitex — Akatsuki Research
Incident analysis and hunting guidance for the Nobitex breach, including blockchain ecosystem threats and ATT&CK mapping.
❤2