🔰Ghidra Software Reverse Engineering Framework
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and noscripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes.
Download Link:
https://github.com/NationalSecurityAgency/ghidra/releases
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and noscripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes.
Download Link:
https://github.com/NationalSecurityAgency/ghidra/releases
GitHub
Releases · NationalSecurityAgency/ghidra
Ghidra is a software reverse engineering (SRE) framework - NationalSecurityAgency/ghidra
Collection of books found in Dread Forums
https://drive.google.com/drive/folders/1F7D5c30nP-y_Q7SFqoRTRvJ7tl0UcY3q
https://drive.google.com/drive/folders/1F7D5c30nP-y_Q7SFqoRTRvJ7tl0UcY3q
200+ PDF
Hacking and Infosec
https://drive.google.com/drive/u/0/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU
Hacking and Infosec
https://drive.google.com/drive/u/0/folders/12Mvq6kE2HJDwN2CZhEGWizyWt87YunkU
Source Byte pinned «Collection of books found in Dread Forums https://drive.google.com/drive/folders/1F7D5c30nP-y_Q7SFqoRTRvJ7tl0UcY3q»
آموزش یک سوم کردن ترافیک اینترنت از سگارو
https://telegra.ph/A-method-for-reducing-internet-traffic-by-a-third-and-connecting-to-free-internet-by-iSegaro-11-17
https://telegra.ph/A-method-for-reducing-internet-traffic-by-a-third-and-connecting-to-free-internet-by-iSegaro-11-17
Telegraph
A method for reducing internet traffic by a third and connecting to free internet by iSegaro
سلام و روز خوش , حالتون چطوره ؟ سگارو هستم بریم که امروز میخوایم بترکونیم , با روشی که برای اولین بار معرفی میشه و قبل از این اموزش شما نمونش رو هیچ جایی ندیده و نخواهید دید , کاملا اختصاصی
Media is too big
VIEW IN TELEGRAM
Advance forwarding bot @OldForwardbot is Up Now
➜ I'm simple and easy files forward bot!
➜ I can forward files from one channel to another channel.
➜ With more features.
🎉 Available Features:
➜ Filter file types as your wish.
➜ Custom file button.
➜ Filter file extensions as your wish.
➜ Filter file keywords as your wish.
➜ Filter using file size as your wish.
➜ Skip duplicate files. (Need to add MongoDB)
➜ Custom file caption.
➜ Support restricted channels.
➜ Protect forward files as your wish.
➜ I'm simple and easy files forward bot!
➜ I can forward files from one channel to another channel.
➜ With more features.
🎉 Available Features:
➜ Filter file types as your wish.
➜ Custom file button.
➜ Filter file extensions as your wish.
➜ Filter file keywords as your wish.
➜ Filter using file size as your wish.
➜ Skip duplicate files. (Need to add MongoDB)
➜ Custom file caption.
➜ Support restricted channels.
➜ Protect forward files as your wish.
Introduction to Schudo heap allocator and its exploit mitigations
Credits Kevin Denis Synacktiv synacktiv.com/en/publication…
Credits Kevin Denis Synacktiv synacktiv.com/en/publication…
Guide on obscure features of C programming language by Jorengarenar
blog.joren.ga/less-known-c
blog.joren.ga/less-known-c
Ptrace Security GmbH
Using LLMs to reverse JavaScript variable name minification
thejunkland.com/blog/using-l…
Using LLMs to reverse JavaScript variable name minification
thejunkland.com/blog/using-l…
PowerShell-Obfuscation-Bible: A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell noscripts to achieve AV evasion, compiled for educational purposes. The contents of this repository
github.com/t3l3machus/PowerS…
github.com/t3l3machus/PowerS…
boopkit: Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin..
github.com/krisnova/boopkit
github.com/krisnova/boopkit
Excellent series for learning the basic of ELF file format internals
Credits IntezerLabs
Part 1:
intezer.com/blog/research/ex…
Part 2:
intezer.com/blog/malware-ana…
Part 3:
intezer.com/blog/malware-ana…
Part 4:
intezer.com/blog/malware-ana…
Credits IntezerLabs
Part 1:
intezer.com/blog/research/ex…
Part 2:
intezer.com/blog/malware-ana…
Part 3:
intezer.com/blog/malware-ana…
Part 4:
intezer.com/blog/malware-ana…
Beginner introduction to Linux processes and how they are started by the execve() syscall
iq.thc.org/how-does-linux-st…
iq.thc.org/how-does-linux-st…
Interesting writeup by raelizecom on how to use power and electromagnetic analysis to break hardware cryptography using
Power analysis:
raelize.com/blog/espressif-s…
Electromagnetic analysis:
raelize.com/blog/espressif-s…
Power analysis:
raelize.com/blog/espressif-s…
Electromagnetic analysis:
raelize.com/blog/espressif-s…
Mobile Malware Analysis Part 3 – Pegasus
8ksec.io/mobile-malware-anal…
8ksec.io/mobile-malware-anal…
ProcessStomping
A variation of ProcessOverwriting to execute shellcode on an executable's section.
https://github.com/naksyn/ProcessStomping
#cybersecurity #infosec #pentesting #redteam
A variation of ProcessOverwriting to execute shellcode on an executable's section.
https://github.com/naksyn/ProcessStomping
#cybersecurity #infosec #pentesting #redteam
GitHub
GitHub - naksyn/ProcessStomping: A variation of ProcessOverwriting to execute shellcode on an executable's section
A variation of ProcessOverwriting to execute shellcode on an executable's section - naksyn/ProcessStomping
#tools
#Threat_Research
Awesome GPTs (Agents) for Cybersecurity
https://github.com/fr0gger/Awesome-GPT-Agents
#Threat_Research
Awesome GPTs (Agents) for Cybersecurity
https://github.com/fr0gger/Awesome-GPT-Agents
GitHub
GitHub - fr0gger/Awesome-GPT-Agents: A curated list of GPT agents for cybersecurity
A curated list of GPT agents for cybersecurity. Contribute to fr0gger/Awesome-GPT-Agents development by creating an account on GitHub.