Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
امیدوارم استفاده از blake3 به جای SHA256 بیشتر شود نه به خاطر اینکه به شدت امن است یا SHA256 که پایه آن SHA1 ضعیف است یاحتی توسط NSA ساخته شده، بلکه به این دلیل که مشترکا توسط مهندسین نرم‌افزار و رمزنگارها طراحی شده که Performance شدیدا بهتری دارد.
peergos.org/posts/blake3

VAHID NAMENI
Igor’s Tip of the Week #165: Defining floating-point data
hex-rays.com/blog/igors-tip-
Analysis of Vanguard's guarded regions (Windows game anti-cheating systems internals)
Excellent blog post by @Xyrem256
reversing.info/posts/guarded
🎃1
Reverse Engineering resources.

• Books;
• Courses;
• Practice;
• Hex Editors;
• Binary Format;
• Disassemblers;
• Binary Analysis;
• Bytecode Analysis;
• Import Reconstruction;
• Dynamic Analysis;
• Debugging;
• Mac Decrypt;
• Document Analysis;
• Scripting;
• Android;
• Yara
;

https://github.com/wtsxDev/reverse-engineering

#reverse #engineering
Implementing Reverse Engineering.pdf
30.7 MB
Assembly Language for x86 Processors.pdf
11.5 MB
‼️ Assembly Language for x86 Processors, 7th Edition
Slides deck on signal handling in Linux
courses.cms.caltech.edu/cs12
Mockingjay revisisted - Process stomping and loading beacon with sRDI
naksyn.com/edr%20evasion/202
Event Tracing for Windows (ETW) is crucial for modern EDR solutions. But what do you really know about its internal workings? Dive into ETW to discover useful attack targets and forensic information.

https://blog.trailofbits.com/2023/11/22/etw-internals-for-security-research-and-forensics/

@islemolecule_SOURCE
🎃2
Forwarded from vx-underground
Media is too big
VIEW IN TELEGRAM
Today EUROPOL in conjunction with the Ukraine National Police arrested individuals operating a ransomware group out of Ukraine. The group is believed to be behind the ransoming of 'over 1,000 servers'.

They released footage of some of the arrests
🤓1
❤‍🔥4