Translucent Kernel Memory Access from Usermode
themalwareman.com/Translucen…
#windows_internls , #kernel_mode , #user_mode
themalwareman.com/Translucen…
#windows_internls , #kernel_mode , #user_mode
This media is not supported in your browser
VIEW IN TELEGRAM
This one simple trick will land you a job anywhere 😮💨
Forwarded from 📡
Advanced hunting for group policy settings:
github.com/tomwechsler/Activ…
github.com/tomwechsler/Activ…
Excellent guide by dhaval kapil on glibc heap internals and exploitation techniques
heap-exploitation.dhavalkapi…
#exploit , #heap , #windows_internls
heap-exploitation.dhavalkapi…
#exploit , #heap , #windows_internls
DuckDuckC2: A proof-of-concept C2 channel through DuckDuckGo's image proxy service"
github.com/nopcorn/DuckDuckC…
#c2
github.com/nopcorn/DuckDuckC…
#c2
Heap exploit series by Ch0pin
۱− infosecwriteups.com/the-todd…
۲− infosecwriteups.com/the-todd…
۳− infosecwriteups.com/the-todd…
۴− infosecwriteups.com/the-todd…
۵− infosecwriteups.com/the-todd…
۶− infosecwriteups.com/the-todd…
۷− infosecwriteups.com/the-todd…
۸− infosecwriteups.com/the-todd…
۹− infosecwriteups.com/the-todd…
#heap , #exploitation
۱− infosecwriteups.com/the-todd…
۲− infosecwriteups.com/the-todd…
۳− infosecwriteups.com/the-todd…
۴− infosecwriteups.com/the-todd…
۵− infosecwriteups.com/the-todd…
۶− infosecwriteups.com/the-todd…
۷− infosecwriteups.com/the-todd…
۸− infosecwriteups.com/the-todd…
۹− infosecwriteups.com/the-todd…
#heap , #exploitation
IDA Pro 8.3 installer
(Was find on virus total)
(it's password protected)
Source : pwn3rzs
Wait for them to leak it😕🫶
https://news.1rj.ru/str/source_chat/1504
(Was find on virus total)
(it's password protected)
Source : pwn3rzs
Wait for them to leak it😕🫶
https://news.1rj.ru/str/source_chat/1504
Kernel mode WinDbg extension and PoCs for token privilege investigation. github.com/daem0nc0re/PrivFu
Google Calendar RAT is a PoC of Command&Control over Google Calendar Event
github.com/MrSaighnal/GCR-Go…
#c2
github.com/MrSaighnal/GCR-Go…
#c2
Another approach of Threadless injection discovered by EthicalChaos in c that loads a module into the target process and stomps it, and reverting back memory protections and original memory state
github.com/TheD1rkMtr/D1rkIn…
github.com/TheD1rkMtr/D1rkIn…
A Beginner’s Guide to Adversary Emulation with Caldera
blog.nviso.eu/2023/08/25/a-b…
در این پلی لیست یوتیوب هم به ایمولیت رد تیم پرداخته شده (فارسی) و چندین c2 اموزش داده شده
https://www.youtube.com/watch?v=MOUNg--_MLk&list=PLwq8--jsXOEkhbmV0Dd_wupwSFHPYF3rO
blog.nviso.eu/2023/08/25/a-b…
Forwarded from SoheilSec (SH)
لیست اکسپلویت های که APT گروه های چینی از سال 2021 تاکنون گمان میرود استفاده کردند
گزارش recorded future
https://www.recordedfuture.com/charting-chinas-climb-leading-global-cyber-power
گزارش recorded future
https://www.recordedfuture.com/charting-chinas-climb-leading-global-cyber-power
Understanding the PE file format is key to reverse engineering windows executables. If you need help, Dr Josh Stroschein have a playlist with over 4 hours of content covering many of the most important aspects on youtube 👇
▶️ https://youtube.com/playlist?list=PLHJns8WZXCdstHnLaxcz-CO74fO4Q88_8&feature=shared
▶️ https://youtube.com/playlist?list=PLHJns8WZXCdstHnLaxcz-CO74fO4Q88_8&feature=shared
https://mega.nz/folder/QzkSTKrS#qAks5qwmfL-Si97gxsWHhgabout 300 HTB Machines writeups any difficulty / premium