Forwarded from Soxoj insides
My talk on leHACK 2023: "Hardcore OSINT: Reversing social media mechanisms" 😚
👉 Lots of technical tricks to enumerate users on social media
👉 Extracting user IDs from large ecosystems
👉 How to protect your service and build OSINT-proof 🛡 users storage
Tried my best to balance between technical hell, practical use, and jokes🙈
Feel free to write me to get the full presentation📖
https://www.youtube.com/watch?v=0yQRf0Mx-hc
👉 Lots of technical tricks to enumerate users on social media
👉 Extracting user IDs from large ecosystems
👉 How to protect your service and build OSINT-proof 🛡 users storage
Tried my best to balance between technical hell, practical use, and jokes
Feel free to write me to get the full presentation
https://www.youtube.com/watch?v=0yQRf0Mx-hc
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
Hardcore OSINT : Reversing social media mechanisms - Dmitry Danilov Soxoj 🇬🇧
You’ll see how to exploit the features of social networks to get more data. Let’s delve into code and hack!
❤🔥2❤1
Direct system calls vs. indirect system calls
https://xss.is/threads/97422/
#syscall , #windows_internls
https://xss.is/threads/97422/
#syscall , #windows_internls
Source Byte
Jonathan Reiter is the Authors of sans SEC670 (Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control) so don't miss this one ! https://www.sans.org/webcasts/intro-c-windows-devs/ --> LINK @islemolecule_SOURCE
part 5 is coming , don't miss it !!!
Part 5 - Intro to C for #Windows
Linked list enumeration, #API, and #windows_internls
I don't know if you all are keeping track, this is now 10(!) FREE hours of hands-on training in C from SANS SEC670 author @jon__reiter
Register here : https://sans.org/u/1u3Z
i will share recorded video in group also
Part 5 - Intro to C for #Windows
Linked list enumeration, #API, and #windows_internls
I don't know if you all are keeping track, this is now 10(!) FREE hours of hands-on training in C from SANS SEC670 author @jon__reiter
Register here : https://sans.org/u/1u3Z
❤🔥2
❤🔥2
Malware Unpacking With Memory Dumps - Intermediate Methods
https://embee-research.ghost.io/unpacking-malware-using-process-hacker-and-memory-inspection/
#malware_analysis
https://embee-research.ghost.io/unpacking-malware-using-process-hacker-and-memory-inspection/
#malware_analysis
A cross-platform Command and Control (C2) framework written in Golang and Python.
https://github.com/gatariee/Winton
#malware_dev , #c2 , #go
https://github.com/gatariee/Winton
#malware_dev , #c2 , #go
In 2021, I worked with
@juanandres_gs on a Predatory Sparrow attack against the fuel system. I did not openly share the draft back then, as it exposed live vulnnerable systems. Having their second go with it yesterday, it's time to share it openly now.
https://sites.google.com/darkcell.se/www/sparrows
@juanandres_gs on a Predatory Sparrow attack against the fuel system. I did not openly share the draft back then, as it exposed live vulnnerable systems. Having their second go with it yesterday, it's time to share it openly now.
https://sites.google.com/darkcell.se/www/sparrows
🤔2
Offensive Windows IPC Internals 3: ALPC
https://csandker.io/2022/05/24/Offensive-Windows-IPC-3-ALPC.html
#windows_internals , #ALPC
https://csandker.io/2022/05/24/Offensive-Windows-IPC-3-ALPC.html
#windows_internals , #ALPC
Debugging and Reversing ALPC
https://csandker.io/2022/05/29/Debugging-And-Reversing-ALPC.html
#windows_internals , #reversing , #debugging , #ALPC
https://csandker.io/2022/05/29/Debugging-And-Reversing-ALPC.html
#windows_internals , #reversing , #debugging , #ALPC
Most PE executables only have a DOS stub, but Robert Xiao combined DOOM Dos and Windows executables into a single universal file.
Advanced merge of genuine Dos headers, relocations, DOS4/GW headers and PE file.
https://github.com/nneonneo/universal-doom
#PE
Advanced merge of genuine Dos headers, relocations, DOS4/GW headers and PE file.
https://github.com/nneonneo/universal-doom
#PE
intresting google dork by coinicap which show "national IDs"
i will not share the exact dork becuase of users privacy :)
site:https://test.com/ کارت ملی❤🔥3
Source Byte
intresting google dork by coinicap which show "national IDs" site:https://test.com/ کارت ملی i will not share the exact dork becuase of users privacy :)
as i see it works with many websites :)
🤓3
Malware Development for Dummies
In the age of EDR, red team operators cannot get away with using pre-compiled payloads anymore. As such, malware development is becoming a vital skill for any operator. This workshop will show you all you need to get started!
Slides:
https://github.com/chvancooten/maldev-for-dummies/tree/main/Slides
Exercises:
https://github.com/chvancooten/maldev-for-dummies/tree/main/Exercises
#malware_dev #csharp #nim #golang #rust
In the age of EDR, red team operators cannot get away with using pre-compiled payloads anymore. As such, malware development is becoming a vital skill for any operator. This workshop will show you all you need to get started!
Slides:
https://github.com/chvancooten/maldev-for-dummies/tree/main/Slides
Exercises:
https://github.com/chvancooten/maldev-for-dummies/tree/main/Exercises
#malware_dev #csharp #nim #golang #rust
❤🔥2👍1
Novel Detection of Process Injection Using Network Anomalies
https://akamai.com/blog/security-research/novel-detection-methodology-process-injection-using-network-anomalies
#process_injection , #detection
https://akamai.com/blog/security-research/novel-detection-methodology-process-injection-using-network-anomalies
#process_injection , #detection
👍5
Should I share open-source tools that I find interesting? (to get ideas from them)
Anonymous Poll
89%
yes
11%
no