Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
👍3
Source Byte pinned «A set of fully-undetectable process injection techniques abusing Windows Thread Pools https://github.com/SafeBreach-Labs/PoolParty #process_injection , #tools»
I have analyzed a lot of offensive job offers, the result is that a series of certificates will get you to the interview
This is just my personal opinion, I checked it in a month

SH✍🏻

https://twitter.com/soheilsec/status/1736369652685578637

#job_offer ,
❤‍🔥3
Media is too big
VIEW IN TELEGRAM
#advertisment -> join our sister channel -> @sec_hint

Python training series focusing on tool development
The topic of this session: starting with Python language and variable types

#python ,#tools_development ,

language : persian
👍4
DirtyCred (CVE-2022-3910) for container escape
Credits @starlabs_sg

starlabs.sg/blog/2023/07-a-n…

#Linux
,#kernel , #CVE_analysis
❤‍🔥1
Inline Hooking for Programmers (Part 2: Writing a Hooking Engine)

https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-2.html

#hooking
Windows Hooks-Persian.pdf
169.6 KB
Windows Hooks-Persian.pdf

#hooking
❤‍🔥2
Windows API Hooking Tutorial (Example with DLL Injection)

https://www.apriorit.com/dev-blog/160-apihooks

#hooking
❤‍🔥2
Assembly blocks for hooking windows API functions.

https://github.com/EgeBalci/Hook_API

#hooking
❤‍🔥2
Forwarded from Soxoj insides
My talk on leHACK 2023: "Hardcore OSINT: Reversing social media mechanisms" 😚

👉 Lots of technical tricks to enumerate users on social media

👉 Extracting user IDs from large ecosystems

👉 How to protect your service and build OSINT-proof 🛡 users storage

Tried my best to balance between technical hell, practical use, and jokes 🙈

Feel free to write me to get the full presentation 📖

https://www.youtube.com/watch?v=0yQRf0Mx-hc
Please open Telegram to view this post
VIEW IN TELEGRAM
❤‍🔥21
Direct system calls vs. indirect system calls

https://xss.is/threads/97422/

#syscall , #windows_internls
30240-[persian]-dll-injection-&-hooking (1).pdf
992.5 KB
[persian]-dll-injection-&-hooking.pdf

Arash tabe

#hooking