https://github.com/0xEr3bus/PoolPartyBof
A beacon object file implementation of PoolParty Process Injection Technique.
#github #tools #cs
A beacon object file implementation of PoolParty Process Injection Technique.
#github #tools #cs
GitHub
GitHub - 0xEr3bus/PoolPartyBof: A beacon object file implementation of PoolParty Process Injection Technique.
A beacon object file implementation of PoolParty Process Injection Technique. - 0xEr3bus/PoolPartyBof
❤🔥1
#LoadLibrary #memory
LoadLibrary for offensive operations (from disk, memory + don't link to PEB )
https://github.com/bats3c/DarkLoadLibrary
LoadLibrary for offensive operations (from disk, memory + don't link to PEB )
https://github.com/bats3c/DarkLoadLibrary
GitHub
GitHub - bats3c/DarkLoadLibrary: LoadLibrary for offensive operations
LoadLibrary for offensive operations. Contribute to bats3c/DarkLoadLibrary development by creating an account on GitHub.
Windows rootkit development for red teaming and adversary emulation
Excellent series by
@Idov31
Part 1:
https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
Part 2:
https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html
Part 3:
https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html
Part 4:
https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html
PArt 5:
https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html
−−−−−−−−−−−−−−−−−−−−−−
#windows , #infosec , #rootkit , #red_team , #adversary_emulation
Excellent series by
@Idov31
Part 1:
https://idov31.github.io/2022/07/14/lord-of-the-ring0-p1.html
Part 2:
https://idov31.github.io/2022/08/04/lord-of-the-ring0-p2.html
Part 3:
https://idov31.github.io/2022/10/30/lord-of-the-ring0-p3.html
Part 4:
https://idov31.github.io/2023/02/24/lord-of-the-ring0-p4.html
PArt 5:
https://idov31.github.io/2023/07/19/lord-of-the-ring0-p5.html
−−−−−−−−−−−−−−−−−−−−−−
#windows , #infosec , #rootkit , #red_team , #adversary_emulation
🤔3👍1
mdmz_book.pdf
70.4 MB
Malware development by cocomelonc
#malware_dev
https://cocomelonc.github.io/book/2022/07/16/mybook.html
#malware_dev
https://cocomelonc.github.io/book/2022/07/16/mybook.html
❤🔥3
Malware Development for Ethical Hackers
#malware_dev
https://github.com/PacktPublishing/Malware-Development-for-Ethical-Hackers
#malware_dev
https://github.com/PacktPublishing/Malware-Development-for-Ethical-Hackers
❤🔥2
Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers
#shellcode
https://github.com/snowcra5h/win32-shellcode
#shellcode
https://github.com/snowcra5h/win32-shellcode
GitHub
GitHub - 7etsuo/win32-shellcode: Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal…
Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers - GitHub - 7etsuo/win32-shellcode: Win32 Shellcode CheatSheet: You...
👍1
Malwild
The book is divided into three logical chapters:
Malware dev tricks from source code leaks
Malware analysis examples
Helper noscripts (most in python) for malware analysis
https://malware.news/t/malware-in-the-wild-book/76625
The book is divided into three logical chapters:
Malware dev tricks from source code leaks
Malware analysis examples
Helper noscripts (most in python) for malware analysis
https://malware.news/t/malware-in-the-wild-book/76625
👍3
malwild.pdf
83.9 MB
❤🔥8
RCE | XSS via Image Exif metadata
https://gokulvinesh.medium.com/rce-xss-via-image-exif-metadata-dddf33dadb41
#web , #xss , #rce ,#meta_data
https://gokulvinesh.medium.com/rce-xss-via-image-exif-metadata-dddf33dadb41
#web , #xss , #rce ,#meta_data
🤓3
awesome-windows-exploitation by farzin karemi
old but GOLD :)
https://web.archive.org/web/20170123124214/https://github.com/enddo/awesome-windows-exploitation
#windows , #exploit , #old_but_gold😁
old but GOLD :)
https://web.archive.org/web/20170123124214/https://github.com/enddo/awesome-windows-exploitation
#windows , #exploit , #old_but_gold😁
👍3
Ghidra Basics - Manual Shellcode Analysis and C2 Extraction
embee-research.ghost.io/ghid…
#ghidra , #c2 , #shellcode
embee-research.ghost.io/ghid…
#ghidra , #c2 , #shellcode
Nice collection of resources for getting started with Satellite hacking and CTFs 😂
Satellite Hacking Demystified: redteamrecipe.com/Satellite-…
Hack-a-sat writeups: github.com/solar-wine/writeu…
Hack-a-sat players corner: hackasat.com/players-corner/
#satellite
Satellite Hacking Demystified: redteamrecipe.com/Satellite-…
Hack-a-sat writeups: github.com/solar-wine/writeu…
Hack-a-sat players corner: hackasat.com/players-corner/
#satellite
SHA1 and its weaknesses
Excellent writeup by Declain Thomas (@evervault)
evervault.com/blog/sha-1-get…
#sha1
Excellent writeup by Declain Thomas (@evervault)
evervault.com/blog/sha-1-get…
#sha1
Forwarded from Proxy Bar
Linux Red Team
1- Exploitation Techniques
2 - Privilege Escalation Techniques
3 - Persistence Techniques
4 - Defense Evasion - Hiding Linux Processes
5 - Defense Evasion - Rootkits
#linux #learn #hack
cat /home/redteam/
1- Exploitation Techniques
2 - Privilege Escalation Techniques
3 - Persistence Techniques
4 - Defense Evasion - Hiding Linux Processes
5 - Defense Evasion - Rootkits
#linux #learn #hack