Source Byte – Telegram
Source Byte
7.76K subscribers
847 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
spray.js
1.1 KB
🔥🔥🔥FoxitReader Precise Heap Spray 0c0c0c0c bc.
⚠️Testesd version: 9.0.1.1049
👍2🔥1
تصاویری از اتاق مانیتورینگ پهپاد اوکراینی‌ها.
یکی از افراد اتاق ظاهرا برخی از تصاویر رو در گروه تلگرامی منتشر میکنه و یا شاید از تصاویر منتشر شده در دیگر گروه‌های تلگرامی برای پیدا کردن هدف استفاده میکنه!!!!!
«جنگ عجیبی‌ست»
🔥4
cyber_essentials.pdf
505.9 KB
The_Red_Team_Handbook.pdf
5.2 MB
The_Red_Team_Handbook.pdf
1
|mmm Conti|



🛡For educational purposes only!
Source code + recommendations from the FBI, CISA & NSA on mitigation
😁1
SANS FOR608 pdf 2022
🔥4
3
Source Byte pinned «https://www.youtube.com/live/-TZd9zXdhCs?feature=share»
CVE-2023-21608.zip
22.9 KB
🔥🔥🔥Adobe Acrobat Reader - resetForm - CAgg UaF - RCE Exploit(CVE-2023-21608)
In the third part of the PDF Reader series
(
first,second), hacksys are going to see how we exploited a UAF vulnerability in Adobe Acrobat Reader DC. The bug was found during our fuzzing campaign targeting popular PDF readers. They are were able to successfully exploit this vulnerability to gain RCE in the context of Adobe Acrobat Reader.

🔖CVE-2023-21608 Exploit

📺Demo: Adobe Acrobat Reader DC - UaF - Remote Code Execution - CVE-2023-21608
Forwarded from vx-underground
The United States government is investigating a spy-balloon which has been in its airspace for several days. Senior defense officials at the Pentagon have stated with "very high confidence" it is Chinese

The United States Airforce has been deployed.

Unrelated to malware, of course. However, this plays into the geopolitical and espionage subject we typically explore with state sponsored activity.

More information: https://apnews.com/article/chinese-surveillance-balloon-united-states-montana-47248b0ef2b085620fcd866c105054be
👍1
ORKL

The Community Driven Cyber Threat Intelligence Library:

12 461 CTI publicly released CTI reports
1099 threat actors
11 sources
10 languages

https://orkl.eu/