Source Byte – Telegram
Source Byte
7.75K subscribers
846 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Inline Hooking for Programmers (Part 2: Writing a Hooking Engine)

https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-2.html

#hooking
Windows Hooks-Persian.pdf
169.6 KB
Windows Hooks-Persian.pdf

#hooking
❤‍🔥2
Windows API Hooking Tutorial (Example with DLL Injection)

https://www.apriorit.com/dev-blog/160-apihooks

#hooking
❤‍🔥2
Assembly blocks for hooking windows API functions.

https://github.com/EgeBalci/Hook_API

#hooking
❤‍🔥2
Forwarded from Soxoj insides
My talk on leHACK 2023: "Hardcore OSINT: Reversing social media mechanisms" 😚

👉 Lots of technical tricks to enumerate users on social media

👉 Extracting user IDs from large ecosystems

👉 How to protect your service and build OSINT-proof 🛡 users storage

Tried my best to balance between technical hell, practical use, and jokes 🙈

Feel free to write me to get the full presentation 📖

https://www.youtube.com/watch?v=0yQRf0Mx-hc
Please open Telegram to view this post
VIEW IN TELEGRAM
❤‍🔥21
Direct system calls vs. indirect system calls

https://xss.is/threads/97422/

#syscall , #windows_internls
30240-[persian]-dll-injection-&-hooking (1).pdf
992.5 KB
[persian]-dll-injection-&-hooking.pdf

Arash tabe

#hooking
Source Byte
Jonathan Reiter is the Authors of sans SEC670 (Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control) so don't miss this one ! https://www.sans.org/webcasts/intro-c-windows-devs/ --> LINK @islemolecule_SOURCE
part 5 is coming , don't miss it !!!

Part 5 - Intro to C for #Windows

Linked list enumeration, #API, and #windows_internls

I don't know if you all are keeping track, this is now 10(!) FREE hours of hands-on training in C from SANS SEC670 author @jon__reiter

Register here : https://sans.org/u/1u3Z

i will share recorded video in group also
❤‍🔥2
Hooking-Ahmadian.pdf
2.4 MB
Hooking-Ahmadian(Persian).pdf


#hooking
❤‍🔥1
❤‍🔥2
reverse Engineering, assembly and some concepts
https://0xinfection.github.io/reversing/

#reverse
A cross-platform Command and Control (C2) framework written in Golang and Python.

https://github.com/gatariee/Winton

#malware_dev , #c2 , #go
In 2021, I worked with
@juanandres_gs on a Predatory Sparrow attack against the fuel system. I did not openly share the draft back then, as it exposed live vulnnerable systems. Having their second go with it yesterday, it's time to share it openly now.
https://sites.google.com/darkcell.se/www/sparrows
🤔2
pe-file-format-compendium-11-by-goppit-arteam.pdf
5.2 MB
Explain pe file format from ARteam

#pe
❤‍🔥6
Most PE executables only have a DOS stub, but Robert Xiao combined DOOM Dos and Windows executables into a single universal file.

Advanced merge of genuine Dos headers, relocations, DOS4/GW headers and PE file.

https://github.com/nneonneo/universal-doom

#PE