Source Byte – Telegram
Source Byte
7.76K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
👍3
Source Byte pinned «A set of fully-undetectable process injection techniques abusing Windows Thread Pools https://github.com/SafeBreach-Labs/PoolParty #process_injection , #tools»
I have analyzed a lot of offensive job offers, the result is that a series of certificates will get you to the interview
This is just my personal opinion, I checked it in a month

SH✍🏻

https://twitter.com/soheilsec/status/1736369652685578637

#job_offer ,
❤‍🔥3
Media is too big
VIEW IN TELEGRAM
#advertisment -> join our sister channel -> @sec_hint

Python training series focusing on tool development
The topic of this session: starting with Python language and variable types

#python ,#tools_development ,

language : persian
👍4
DirtyCred (CVE-2022-3910) for container escape
Credits @starlabs_sg

starlabs.sg/blog/2023/07-a-n…

#Linux
,#kernel , #CVE_analysis
❤‍🔥1
Inline Hooking for Programmers (Part 2: Writing a Hooking Engine)

https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-2.html

#hooking
Windows Hooks-Persian.pdf
169.6 KB
Windows Hooks-Persian.pdf

#hooking
❤‍🔥2
Windows API Hooking Tutorial (Example with DLL Injection)

https://www.apriorit.com/dev-blog/160-apihooks

#hooking
❤‍🔥2
Assembly blocks for hooking windows API functions.

https://github.com/EgeBalci/Hook_API

#hooking
❤‍🔥2
Forwarded from Soxoj insides
My talk on leHACK 2023: "Hardcore OSINT: Reversing social media mechanisms" 😚

👉 Lots of technical tricks to enumerate users on social media

👉 Extracting user IDs from large ecosystems

👉 How to protect your service and build OSINT-proof 🛡 users storage

Tried my best to balance between technical hell, practical use, and jokes 🙈

Feel free to write me to get the full presentation 📖

https://www.youtube.com/watch?v=0yQRf0Mx-hc
Please open Telegram to view this post
VIEW IN TELEGRAM
❤‍🔥21
Direct system calls vs. indirect system calls

https://xss.is/threads/97422/

#syscall , #windows_internls
30240-[persian]-dll-injection-&-hooking (1).pdf
992.5 KB
[persian]-dll-injection-&-hooking.pdf

Arash tabe

#hooking
Source Byte
Jonathan Reiter is the Authors of sans SEC670 (Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control) so don't miss this one ! https://www.sans.org/webcasts/intro-c-windows-devs/ --> LINK @islemolecule_SOURCE
part 5 is coming , don't miss it !!!

Part 5 - Intro to C for #Windows

Linked list enumeration, #API, and #windows_internls

I don't know if you all are keeping track, this is now 10(!) FREE hours of hands-on training in C from SANS SEC670 author @jon__reiter

Register here : https://sans.org/u/1u3Z

i will share recorded video in group also
❤‍🔥2