Source Byte pinned «Collection of books found in Dread Forums https://drive.google.com/drive/folders/1F7D5c30nP-y_Q7SFqoRTRvJ7tl0UcY3q»
آموزش یک سوم کردن ترافیک اینترنت از سگارو
https://telegra.ph/A-method-for-reducing-internet-traffic-by-a-third-and-connecting-to-free-internet-by-iSegaro-11-17
https://telegra.ph/A-method-for-reducing-internet-traffic-by-a-third-and-connecting-to-free-internet-by-iSegaro-11-17
Telegraph
A method for reducing internet traffic by a third and connecting to free internet by iSegaro
سلام و روز خوش , حالتون چطوره ؟ سگارو هستم بریم که امروز میخوایم بترکونیم , با روشی که برای اولین بار معرفی میشه و قبل از این اموزش شما نمونش رو هیچ جایی ندیده و نخواهید دید , کاملا اختصاصی
Media is too big
VIEW IN TELEGRAM
Advance forwarding bot @OldForwardbot is Up Now
➜ I'm simple and easy files forward bot!
➜ I can forward files from one channel to another channel.
➜ With more features.
🎉 Available Features:
➜ Filter file types as your wish.
➜ Custom file button.
➜ Filter file extensions as your wish.
➜ Filter file keywords as your wish.
➜ Filter using file size as your wish.
➜ Skip duplicate files. (Need to add MongoDB)
➜ Custom file caption.
➜ Support restricted channels.
➜ Protect forward files as your wish.
➜ I'm simple and easy files forward bot!
➜ I can forward files from one channel to another channel.
➜ With more features.
🎉 Available Features:
➜ Filter file types as your wish.
➜ Custom file button.
➜ Filter file extensions as your wish.
➜ Filter file keywords as your wish.
➜ Filter using file size as your wish.
➜ Skip duplicate files. (Need to add MongoDB)
➜ Custom file caption.
➜ Support restricted channels.
➜ Protect forward files as your wish.
Introduction to Schudo heap allocator and its exploit mitigations
Credits Kevin Denis Synacktiv synacktiv.com/en/publication…
Credits Kevin Denis Synacktiv synacktiv.com/en/publication…
Guide on obscure features of C programming language by Jorengarenar
blog.joren.ga/less-known-c
blog.joren.ga/less-known-c
Ptrace Security GmbH
Using LLMs to reverse JavaScript variable name minification
thejunkland.com/blog/using-l…
Using LLMs to reverse JavaScript variable name minification
thejunkland.com/blog/using-l…
PowerShell-Obfuscation-Bible: A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell noscripts to achieve AV evasion, compiled for educational purposes. The contents of this repository
github.com/t3l3machus/PowerS…
github.com/t3l3machus/PowerS…
boopkit: Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin..
github.com/krisnova/boopkit
github.com/krisnova/boopkit
Excellent series for learning the basic of ELF file format internals
Credits IntezerLabs
Part 1:
intezer.com/blog/research/ex…
Part 2:
intezer.com/blog/malware-ana…
Part 3:
intezer.com/blog/malware-ana…
Part 4:
intezer.com/blog/malware-ana…
Credits IntezerLabs
Part 1:
intezer.com/blog/research/ex…
Part 2:
intezer.com/blog/malware-ana…
Part 3:
intezer.com/blog/malware-ana…
Part 4:
intezer.com/blog/malware-ana…
Beginner introduction to Linux processes and how they are started by the execve() syscall
iq.thc.org/how-does-linux-st…
iq.thc.org/how-does-linux-st…
Interesting writeup by raelizecom on how to use power and electromagnetic analysis to break hardware cryptography using
Power analysis:
raelize.com/blog/espressif-s…
Electromagnetic analysis:
raelize.com/blog/espressif-s…
Power analysis:
raelize.com/blog/espressif-s…
Electromagnetic analysis:
raelize.com/blog/espressif-s…
Mobile Malware Analysis Part 3 – Pegasus
8ksec.io/mobile-malware-anal…
8ksec.io/mobile-malware-anal…
ProcessStomping
A variation of ProcessOverwriting to execute shellcode on an executable's section.
https://github.com/naksyn/ProcessStomping
#cybersecurity #infosec #pentesting #redteam
A variation of ProcessOverwriting to execute shellcode on an executable's section.
https://github.com/naksyn/ProcessStomping
#cybersecurity #infosec #pentesting #redteam
GitHub
GitHub - naksyn/ProcessStomping: A variation of ProcessOverwriting to execute shellcode on an executable's section
A variation of ProcessOverwriting to execute shellcode on an executable's section - naksyn/ProcessStomping
#tools
#Threat_Research
Awesome GPTs (Agents) for Cybersecurity
https://github.com/fr0gger/Awesome-GPT-Agents
#Threat_Research
Awesome GPTs (Agents) for Cybersecurity
https://github.com/fr0gger/Awesome-GPT-Agents
GitHub
GitHub - fr0gger/Awesome-GPT-Agents: A curated list of GPT agents for cybersecurity
A curated list of GPT agents for cybersecurity. Contribute to fr0gger/Awesome-GPT-Agents development by creating an account on GitHub.
Forwarded from vx-underground
Here is a very poorly written way to do 'whoami' using CreateNamedPipe and Advapi32!NpGetUserName.
This undocumented function will do the generic LookupAccountSidW via GetUserNameExW, but it can act as a proxy function, or something.
https://pastebin.com/raw/ZsReS7k4
This undocumented function will do the generic LookupAccountSidW via GetUserNameExW, but it can act as a proxy function, or something.
https://pastebin.com/raw/ZsReS7k4
Forwarded from vx-underground
Tired of seeing nerds arguing about C2's? Next time use some C4. EDR's struggle against C4
Source Byte
https://youtu.be/cxu3QwUK_lk?si=xNGUUPZx8I_s0l9D
I made this video for who that wants to analyze pcap files which are so huge and zeek is enough for that
Ja4 link:
https://github.com/FoxIO-LLC/ja4
Ja4 link:
https://github.com/FoxIO-LLC/ja4
GitHub
GitHub - FoxIO-LLC/ja4: JA4+ is a suite of network fingerprinting standards
JA4+ is a suite of network fingerprinting standards - FoxIO-LLC/ja4