Source Byte – Telegram
Source Byte
7.76K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
🔰Ghidra Software Reverse Engineering Framework


Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and noscripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes.

Download Link:
https://github.com/NationalSecurityAgency/ghidra/releases
Source Byte pinned «Collection of books found in Dread Forums https://drive.google.com/drive/folders/1F7D5c30nP-y_Q7SFqoRTRvJ7tl0UcY3q»
Media is too big
VIEW IN TELEGRAM
Advance forwarding bot @OldForwardbot is Up Now

➜ I'm simple and easy files forward bot!
➜ I can forward files from one channel to another channel.
➜ With more features.

🎉 Available Features:
➜ Filter file types as your wish.
➜ Custom file button.
➜ Filter file extensions as your wish.
➜ Filter file keywords as your wish.
➜ Filter using file size as your wish.
➜ Skip duplicate files. (Need to add MongoDB)
➜ Custom file caption.
➜ Support restricted channels.
➜ Protect forward files as your wish.
Introduction to Schudo heap allocator and its exploit mitigations
Credits Kevin Denis Synacktiv synacktiv.com/en/publication
Guide on obscure features of C programming language by Jorengarenar
blog.joren.ga/less-known-c
Ptrace Security GmbH
Using LLMs to reverse JavaScript variable name minification
thejunkland.com/blog/using-l
PowerShell-Obfuscation-Bible: A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell noscripts to achieve AV evasion, compiled for educational purposes. The contents of this repository

github.com/t3l3machus/PowerS
boopkit: Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin..
github.com/krisnova/boopkit
Excellent series for learning the basic of ELF file format internals
Credits IntezerLabs

Part 1:
intezer.com/blog/research/ex

Part 2:
intezer.com/blog/malware-ana

Part 3:
intezer.com/blog/malware-ana

Part 4:
intezer.com/blog/malware-ana
Beginner introduction to Linux processes and how they are started by the execve() syscall
iq.thc.org/how-does-linux-st
Interesting writeup by raelizecom on how to use power and electromagnetic analysis to break hardware cryptography using

Power analysis:
raelize.com/blog/espressif-s

Electromagnetic analysis:
raelize.com/blog/espressif-s
Mobile Malware Analysis Part 3 – Pegasus
8ksec.io/mobile-malware-anal
Forwarded from vx-underground
Here is a very poorly written way to do 'whoami' using CreateNamedPipe and Advapi32!NpGetUserName.

This undocumented function will do the generic LookupAccountSidW via GetUserNameExW, but it can act as a proxy function, or something.

https://pastebin.com/raw/ZsReS7k4