Forwarded from Stealer Store
TitanStealerSourceCode@stealerstore.rar
47.5 MB
Titan Stealer Source Code
Archive password: @stealerstore
💬 Stealer Developers
Private: @StealerStoreBot
Магазин вредоносных ПО - @MalwareShopBot
Project @MalwareForum
Archive password: @stealerstore
💬 Stealer Developers
Private: @StealerStoreBot
Магазин вредоносных ПО - @MalwareShopBot
Project @MalwareForum
👍1
Stealer + Clipper + Keylogger (C#)
https://github.com/Stealerium/Stealerium
#malware_dev , #stealer , #keylogger
https://github.com/Stealerium/Stealerium
#malware_dev , #stealer , #keylogger
Develope your stealer
https://0x00sec.org/t/malware-development-1-password-stealers-chrome/33571
#malware_dev , #stealer
https://0x00sec.org/t/malware-development-1-password-stealers-chrome/33571
#malware_dev , #stealer
👍3
Source Byte pinned «A set of fully-undetectable process injection techniques abusing Windows Thread Pools https://github.com/SafeBreach-Labs/PoolParty #process_injection , #tools»
I have analyzed a lot of offensive job offers, the result is that a series of certificates will get you to the interview
This is just my personal opinion, I checked it in a month
SH✍🏻
https://twitter.com/soheilsec/status/1736369652685578637
#job_offer ,
This is just my personal opinion, I checked it in a month
SH✍🏻
https://twitter.com/soheilsec/status/1736369652685578637
#job_offer ,
❤🔥3
Media is too big
VIEW IN TELEGRAM
Python training series focusing on tool development
The topic of this session: starting with Python language and variable types
#python ,#tools_development ,
language : persian
👍4
DirtyCred (CVE-2022-3910) for container escape
Credits @starlabs_sg
starlabs.sg/blog/2023/07-a-n…
#Linux ,#kernel , #CVE_analysis
Credits @starlabs_sg
starlabs.sg/blog/2023/07-a-n…
#Linux ,#kernel , #CVE_analysis
Towards 100x Speedup: Full Stack Transformer Inference Optimization
yaofu.notion.site/Towards-10…
see also : Adversarial Attacks on LLMs
#GPU_architecture , #transformer_inference_basics , #memory_layout , #blockwise_decoding ,#LLM
yaofu.notion.site/Towards-10…
see also : Adversarial Attacks on LLMs
#GPU_architecture , #transformer_inference_basics , #memory_layout , #blockwise_decoding ,#LLM
Shellcode Execution via Fibers
https://www.bordergate.co.uk/shellcode-execution-via-fibers/
#shellcode , #fiber , #thread , #windows
https://www.bordergate.co.uk/shellcode-execution-via-fibers/
#shellcode , #fiber , #thread , #windows
Basic Windows API Hooking
https://medium.com/geekculture/basic-windows-api-hooking-acb8d275e9b8
#hooking
#malware_dev
https://medium.com/geekculture/basic-windows-api-hooking-acb8d275e9b8
#hooking
#malware_dev
Windows API hooking. Simple C++ example.
https://cocomelonc.github.io/tutorial/2021/11/30/basic-hooking-1.html
#hooking
https://cocomelonc.github.io/tutorial/2021/11/30/basic-hooking-1.html
#hooking
cocomelonc
Windows API hooking. Simple C++ example.
﷽
❤🔥1
Inline Hooking for Programmers (Part 2: Writing a Hooking Engine)
https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-2.html
#hooking
https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-2.html
#hooking
Malware Injection Techniques: API hooking techniques
https://library.mosse-institute.com/articles/2022/05/malware-injection-techniques-api-hooking-techniques/malware-injection-techniques-api-hooking-techniques.html
#Malware_analysis
#hooking
https://library.mosse-institute.com/articles/2022/05/malware-injection-techniques-api-hooking-techniques/malware-injection-techniques-api-hooking-techniques.html
#Malware_analysis
#hooking
Mosse-Institute
Malware Injection Techniques: API hooking techniques
The API hooking technique (which is based on process injection) is utilized by adversaries in order to modify the input or output of Windows API calls. Use cases include stealing passwords, prevent...
Windows API Hooking Tutorial (Example with DLL Injection)
https://www.apriorit.com/dev-blog/160-apihooks
#hooking
https://www.apriorit.com/dev-blog/160-apihooks
#hooking
❤🔥2
❤🔥2
Forwarded from Soxoj insides
My talk on leHACK 2023: "Hardcore OSINT: Reversing social media mechanisms" 😚
👉 Lots of technical tricks to enumerate users on social media
👉 Extracting user IDs from large ecosystems
👉 How to protect your service and build OSINT-proof 🛡 users storage
Tried my best to balance between technical hell, practical use, and jokes🙈
Feel free to write me to get the full presentation📖
https://www.youtube.com/watch?v=0yQRf0Mx-hc
👉 Lots of technical tricks to enumerate users on social media
👉 Extracting user IDs from large ecosystems
👉 How to protect your service and build OSINT-proof 🛡 users storage
Tried my best to balance between technical hell, practical use, and jokes
Feel free to write me to get the full presentation
https://www.youtube.com/watch?v=0yQRf0Mx-hc
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
Hardcore OSINT : Reversing social media mechanisms - Dmitry Danilov Soxoj 🇬🇧
You’ll see how to exploit the features of social networks to get more data. Let’s delve into code and hack!
❤🔥2❤1