Excellent series for learning the basic of ELF file format internals
Credits IntezerLabs
Part 1:
intezer.com/blog/research/ex…
Part 2:
intezer.com/blog/malware-ana…
Part 3:
intezer.com/blog/malware-ana…
Part 4:
intezer.com/blog/malware-ana…
Credits IntezerLabs
Part 1:
intezer.com/blog/research/ex…
Part 2:
intezer.com/blog/malware-ana…
Part 3:
intezer.com/blog/malware-ana…
Part 4:
intezer.com/blog/malware-ana…
Beginner introduction to Linux processes and how they are started by the execve() syscall
iq.thc.org/how-does-linux-st…
iq.thc.org/how-does-linux-st…
Interesting writeup by raelizecom on how to use power and electromagnetic analysis to break hardware cryptography using
Power analysis:
raelize.com/blog/espressif-s…
Electromagnetic analysis:
raelize.com/blog/espressif-s…
Power analysis:
raelize.com/blog/espressif-s…
Electromagnetic analysis:
raelize.com/blog/espressif-s…
Mobile Malware Analysis Part 3 – Pegasus
8ksec.io/mobile-malware-anal…
8ksec.io/mobile-malware-anal…
ProcessStomping
A variation of ProcessOverwriting to execute shellcode on an executable's section.
https://github.com/naksyn/ProcessStomping
#cybersecurity #infosec #pentesting #redteam
A variation of ProcessOverwriting to execute shellcode on an executable's section.
https://github.com/naksyn/ProcessStomping
#cybersecurity #infosec #pentesting #redteam
GitHub
GitHub - naksyn/ProcessStomping: A variation of ProcessOverwriting to execute shellcode on an executable's section
A variation of ProcessOverwriting to execute shellcode on an executable's section - naksyn/ProcessStomping
#tools
#Threat_Research
Awesome GPTs (Agents) for Cybersecurity
https://github.com/fr0gger/Awesome-GPT-Agents
#Threat_Research
Awesome GPTs (Agents) for Cybersecurity
https://github.com/fr0gger/Awesome-GPT-Agents
GitHub
GitHub - fr0gger/Awesome-GPT-Agents: A curated list of GPT agents for cybersecurity
A curated list of GPT agents for cybersecurity. Contribute to fr0gger/Awesome-GPT-Agents development by creating an account on GitHub.
Forwarded from vx-underground
Here is a very poorly written way to do 'whoami' using CreateNamedPipe and Advapi32!NpGetUserName.
This undocumented function will do the generic LookupAccountSidW via GetUserNameExW, but it can act as a proxy function, or something.
https://pastebin.com/raw/ZsReS7k4
This undocumented function will do the generic LookupAccountSidW via GetUserNameExW, but it can act as a proxy function, or something.
https://pastebin.com/raw/ZsReS7k4
Forwarded from vx-underground
Tired of seeing nerds arguing about C2's? Next time use some C4. EDR's struggle against C4
Source Byte
https://youtu.be/cxu3QwUK_lk?si=xNGUUPZx8I_s0l9D
I made this video for who that wants to analyze pcap files which are so huge and zeek is enough for that
Ja4 link:
https://github.com/FoxIO-LLC/ja4
Ja4 link:
https://github.com/FoxIO-LLC/ja4
GitHub
GitHub - FoxIO-LLC/ja4: JA4+ is a suite of network fingerprinting standards
JA4+ is a suite of network fingerprinting standards - FoxIO-LLC/ja4
Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 2) – Hacktive Security Blog
blog.hacktivesecurity.com/in…
blog.hacktivesecurity.com/in…
Searching for Malicious HTTP Servers by Identifying Typos in HTTP Responses
blog.fox-it.com/2023/11/15/t…
blog.fox-it.com/2023/11/15/t…
Technique for spoofing PE files sections and embed executable code by @x86matthew
secret.club/2023/06/05/spoof…
secret.club/2023/06/05/spoof…
👍2
1. Uncovering a crazy privilege escalation from Chrome extensions
0x44.xyz/blog/cve-2023-4369
2. NVD exploit & JVN
github.com/nomi-sec/NVD-Expl…
0x44.xyz/blog/cve-2023-4369
2. NVD exploit & JVN
github.com/nomi-sec/NVD-Expl…
👍2
ELF 101 - Part 1 Sections and Segments - Intezer
intezer.com/blog/research/ex…
CVE-2023-4357:
Google Chrome LFI
github.com/xcanwin/CVE-2023-…
intezer.com/blog/research/ex…
CVE-2023-4357:
Google Chrome LFI
github.com/xcanwin/CVE-2023-…
👍1
Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes, 2021.
]-> github.com/pwwl/enhanced-bin…
]-> github.com/pwwl/enhanced-bin…
👍1
Knock! Knock! The postman is here! (abusing Mailslots and PortKnocking for connectionless shells)
https://adepts.of0x.cc/connectionless-shells/
https://adepts.of0x.cc/connectionless-shells/
Knock! Knock! The postman is here! (abusing Mailslots and PortKnocking for connectionless shells) |
Knock! Knock! The postman is here! (abusing Mailslots and PortKnocking for connectionless shells) | AdeptsOf0xCC
Creating a connectionless shell using Windows Filtering Platform and Mailslot
❤🔥2
Reflective call stack detections and evasions
securityintelligence.com/x-f…
securityintelligence.com/x-f…