Source Byte – Telegram
Source Byte
7.76K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
boopkit: Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin..
github.com/krisnova/boopkit
Excellent series for learning the basic of ELF file format internals
Credits IntezerLabs

Part 1:
intezer.com/blog/research/ex

Part 2:
intezer.com/blog/malware-ana

Part 3:
intezer.com/blog/malware-ana

Part 4:
intezer.com/blog/malware-ana
Beginner introduction to Linux processes and how they are started by the execve() syscall
iq.thc.org/how-does-linux-st
Interesting writeup by raelizecom on how to use power and electromagnetic analysis to break hardware cryptography using

Power analysis:
raelize.com/blog/espressif-s

Electromagnetic analysis:
raelize.com/blog/espressif-s
Mobile Malware Analysis Part 3 – Pegasus
8ksec.io/mobile-malware-anal
Forwarded from vx-underground
Here is a very poorly written way to do 'whoami' using CreateNamedPipe and Advapi32!NpGetUserName.

This undocumented function will do the generic LookupAccountSidW via GetUserNameExW, but it can act as a proxy function, or something.

https://pastebin.com/raw/ZsReS7k4
Forwarded from vx-underground
Tired of seeing nerds arguing about C2's? Next time use some C4. EDR's struggle against C4
Source Byte
https://youtu.be/cxu3QwUK_lk?si=xNGUUPZx8I_s0l9D
I made this video for who that wants to analyze pcap files which are so huge and zeek is enough for that

Ja4 link:
https://github.com/FoxIO-LLC/ja4
Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 2) – Hacktive Security Blog
blog.hacktivesecurity.com/in
Searching for Malicious HTTP Servers by Identifying Typos in HTTP Responses
blog.fox-it.com/2023/11/15/t
Technique for spoofing PE files sections and embed executable code by @x86matthew

secret.club/2023/06/05/spoof
👍2
1. Uncovering a crazy privilege escalation from Chrome extensions
0x44.xyz/blog/cve-2023-4369



2. NVD exploit & JVN
github.com/nomi-sec/NVD-Expl
👍2
ELF 101 - Part 1 Sections and Segments - Intezer
intezer.com/blog/research/ex



CVE-2023-4357:
Google Chrome LFI
github.com/xcanwin/CVE-2023-
👍1
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes, 2021.

]-> github.com/pwwl/enhanced-bin
👍1