mdmz_book.pdf
70.4 MB
Malware development by cocomelonc
#malware_dev
https://cocomelonc.github.io/book/2022/07/16/mybook.html
#malware_dev
https://cocomelonc.github.io/book/2022/07/16/mybook.html
❤🔥3
Malware Development for Ethical Hackers
#malware_dev
https://github.com/PacktPublishing/Malware-Development-for-Ethical-Hackers
#malware_dev
https://github.com/PacktPublishing/Malware-Development-for-Ethical-Hackers
❤🔥2
Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers
#shellcode
https://github.com/snowcra5h/win32-shellcode
#shellcode
https://github.com/snowcra5h/win32-shellcode
GitHub
GitHub - 7etsuo/win32-shellcode: Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal…
Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers - GitHub - 7etsuo/win32-shellcode: Win32 Shellcode CheatSheet: You...
👍1
Malwild
The book is divided into three logical chapters:
Malware dev tricks from source code leaks
Malware analysis examples
Helper noscripts (most in python) for malware analysis
https://malware.news/t/malware-in-the-wild-book/76625
The book is divided into three logical chapters:
Malware dev tricks from source code leaks
Malware analysis examples
Helper noscripts (most in python) for malware analysis
https://malware.news/t/malware-in-the-wild-book/76625
👍3
malwild.pdf
83.9 MB
❤🔥8
RCE | XSS via Image Exif metadata
https://gokulvinesh.medium.com/rce-xss-via-image-exif-metadata-dddf33dadb41
#web , #xss , #rce ,#meta_data
https://gokulvinesh.medium.com/rce-xss-via-image-exif-metadata-dddf33dadb41
#web , #xss , #rce ,#meta_data
🤓3
awesome-windows-exploitation by farzin karemi
old but GOLD :)
https://web.archive.org/web/20170123124214/https://github.com/enddo/awesome-windows-exploitation
#windows , #exploit , #old_but_gold😁
old but GOLD :)
https://web.archive.org/web/20170123124214/https://github.com/enddo/awesome-windows-exploitation
#windows , #exploit , #old_but_gold😁
👍3
Ghidra Basics - Manual Shellcode Analysis and C2 Extraction
embee-research.ghost.io/ghid…
#ghidra , #c2 , #shellcode
embee-research.ghost.io/ghid…
#ghidra , #c2 , #shellcode
Nice collection of resources for getting started with Satellite hacking and CTFs 😂
Satellite Hacking Demystified: redteamrecipe.com/Satellite-…
Hack-a-sat writeups: github.com/solar-wine/writeu…
Hack-a-sat players corner: hackasat.com/players-corner/
#satellite
Satellite Hacking Demystified: redteamrecipe.com/Satellite-…
Hack-a-sat writeups: github.com/solar-wine/writeu…
Hack-a-sat players corner: hackasat.com/players-corner/
#satellite
SHA1 and its weaknesses
Excellent writeup by Declain Thomas (@evervault)
evervault.com/blog/sha-1-get…
#sha1
Excellent writeup by Declain Thomas (@evervault)
evervault.com/blog/sha-1-get…
#sha1
Forwarded from Proxy Bar
Linux Red Team
1- Exploitation Techniques
2 - Privilege Escalation Techniques
3 - Persistence Techniques
4 - Defense Evasion - Hiding Linux Processes
5 - Defense Evasion - Rootkits
#linux #learn #hack
cat /home/redteam/
1- Exploitation Techniques
2 - Privilege Escalation Techniques
3 - Persistence Techniques
4 - Defense Evasion - Hiding Linux Processes
5 - Defense Evasion - Rootkits
#linux #learn #hack
CSharp Payload Phoning to a CobaltStrike Server
https://isc.sans.edu/forums/diary/30490
#Cobalt_Strike ,
https://isc.sans.edu/forums/diary/30490
#Cobalt_Strike ,
Finding Metasploit & Cobalt Strike URLs
Metasploit and Cobalt Strike generate shellcode for http(s) shells. The URLs found in this shellcode have a path that consist of 4 random alphanumeric characters. But they are not completely random: their 8-bit checksum is a member of a small set of constants.
https://isc.sans.edu/diary/Finding+Metasploit+Cobalt+Strike+URLs/27204
#Cobalt_Strike , #Metasploit ,
Metasploit and Cobalt Strike generate shellcode for http(s) shells. The URLs found in this shellcode have a path that consist of 4 random alphanumeric characters. But they are not completely random: their 8-bit checksum is a member of a small set of constants.
https://isc.sans.edu/diary/Finding+Metasploit+Cobalt+Strike+URLs/27204
#Cobalt_Strike , #Metasploit ,
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
https://github.com/LearningKijo/SecurityResearcher-Note
#Malware_analysis
https://github.com/LearningKijo/SecurityResearcher-Note
#Malware_analysis
#Malware_analysis
GULOADER: deobfuscating the downloader
https://www.elastic.co/security-labs/getting-gooey-with-guloader-downloader
Rhadamanthys v0.5.0 - a deep dive into the stealer’s components
https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components
GULOADER: deobfuscating the downloader
https://www.elastic.co/security-labs/getting-gooey-with-guloader-downloader
Rhadamanthys v0.5.0 - a deep dive into the stealer’s components
https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components
❤🔥1