Inline Hooking for Programmers (Part 2: Writing a Hooking Engine)
https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-2.html
#hooking
https://www.malwaretech.com/2015/01/inline-hooking-for-programmers-part-2.html
#hooking
Malware Injection Techniques: API hooking techniques
https://library.mosse-institute.com/articles/2022/05/malware-injection-techniques-api-hooking-techniques/malware-injection-techniques-api-hooking-techniques.html
#Malware_analysis
#hooking
https://library.mosse-institute.com/articles/2022/05/malware-injection-techniques-api-hooking-techniques/malware-injection-techniques-api-hooking-techniques.html
#Malware_analysis
#hooking
Mosse-Institute
Malware Injection Techniques: API hooking techniques
The API hooking technique (which is based on process injection) is utilized by adversaries in order to modify the input or output of Windows API calls. Use cases include stealing passwords, prevent...
Windows API Hooking Tutorial (Example with DLL Injection)
https://www.apriorit.com/dev-blog/160-apihooks
#hooking
https://www.apriorit.com/dev-blog/160-apihooks
#hooking
❤🔥2
❤🔥2
Forwarded from Soxoj insides
My talk on leHACK 2023: "Hardcore OSINT: Reversing social media mechanisms" 😚
👉 Lots of technical tricks to enumerate users on social media
👉 Extracting user IDs from large ecosystems
👉 How to protect your service and build OSINT-proof 🛡 users storage
Tried my best to balance between technical hell, practical use, and jokes🙈
Feel free to write me to get the full presentation📖
https://www.youtube.com/watch?v=0yQRf0Mx-hc
👉 Lots of technical tricks to enumerate users on social media
👉 Extracting user IDs from large ecosystems
👉 How to protect your service and build OSINT-proof 🛡 users storage
Tried my best to balance between technical hell, practical use, and jokes
Feel free to write me to get the full presentation
https://www.youtube.com/watch?v=0yQRf0Mx-hc
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
Hardcore OSINT : Reversing social media mechanisms - Dmitry Danilov Soxoj 🇬🇧
You’ll see how to exploit the features of social networks to get more data. Let’s delve into code and hack!
❤🔥2❤1
Direct system calls vs. indirect system calls
https://xss.is/threads/97422/
#syscall , #windows_internls
https://xss.is/threads/97422/
#syscall , #windows_internls
Source Byte
Jonathan Reiter is the Authors of sans SEC670 (Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control) so don't miss this one ! https://www.sans.org/webcasts/intro-c-windows-devs/ --> LINK @islemolecule_SOURCE
part 5 is coming , don't miss it !!!
Part 5 - Intro to C for #Windows
Linked list enumeration, #API, and #windows_internls
I don't know if you all are keeping track, this is now 10(!) FREE hours of hands-on training in C from SANS SEC670 author @jon__reiter
Register here : https://sans.org/u/1u3Z
i will share recorded video in group also
Part 5 - Intro to C for #Windows
Linked list enumeration, #API, and #windows_internls
I don't know if you all are keeping track, this is now 10(!) FREE hours of hands-on training in C from SANS SEC670 author @jon__reiter
Register here : https://sans.org/u/1u3Z
❤🔥2
❤🔥2
Malware Unpacking With Memory Dumps - Intermediate Methods
https://embee-research.ghost.io/unpacking-malware-using-process-hacker-and-memory-inspection/
#malware_analysis
https://embee-research.ghost.io/unpacking-malware-using-process-hacker-and-memory-inspection/
#malware_analysis
A cross-platform Command and Control (C2) framework written in Golang and Python.
https://github.com/gatariee/Winton
#malware_dev , #c2 , #go
https://github.com/gatariee/Winton
#malware_dev , #c2 , #go
In 2021, I worked with
@juanandres_gs on a Predatory Sparrow attack against the fuel system. I did not openly share the draft back then, as it exposed live vulnnerable systems. Having their second go with it yesterday, it's time to share it openly now.
https://sites.google.com/darkcell.se/www/sparrows
@juanandres_gs on a Predatory Sparrow attack against the fuel system. I did not openly share the draft back then, as it exposed live vulnnerable systems. Having their second go with it yesterday, it's time to share it openly now.
https://sites.google.com/darkcell.se/www/sparrows
🤔2
Offensive Windows IPC Internals 3: ALPC
https://csandker.io/2022/05/24/Offensive-Windows-IPC-3-ALPC.html
#windows_internals , #ALPC
https://csandker.io/2022/05/24/Offensive-Windows-IPC-3-ALPC.html
#windows_internals , #ALPC
Debugging and Reversing ALPC
https://csandker.io/2022/05/29/Debugging-And-Reversing-ALPC.html
#windows_internals , #reversing , #debugging , #ALPC
https://csandker.io/2022/05/29/Debugging-And-Reversing-ALPC.html
#windows_internals , #reversing , #debugging , #ALPC
Most PE executables only have a DOS stub, but Robert Xiao combined DOOM Dos and Windows executables into a single universal file.
Advanced merge of genuine Dos headers, relocations, DOS4/GW headers and PE file.
https://github.com/nneonneo/universal-doom
#PE
Advanced merge of genuine Dos headers, relocations, DOS4/GW headers and PE file.
https://github.com/nneonneo/universal-doom
#PE