ByteShield
@BinaryWorldd
1.28K
subscribers
99
photos
32
videos
107
files
519
links
Download Telegram
Join
ByteShield
1.28K subscribers
ByteShield
https://exploitation.ashemery.com/
exploitation-course
OFFENSIVE SECURITY & REVERSE ENGINEERING (OSRE) Course
Offensive Software Exploitation Course
ByteShield
https://github.com/ashemery/exploitation-course/tree/master/course/2021
GitHub
exploitation-course/course/2021 at master · ashemery/exploitation-course
Offensive Software Exploitation Course. Contribute to ashemery/exploitation-course development by creating an account on GitHub.
ByteShield
https://github.com/HACKE-RC/awesome-reversing
GitHub
GitHub - HACKE-RC/awesome-reversing: A collection of resources to learn Reverse Engineering from start!
A collection of resources to learn Reverse Engineering from start! - HACKE-RC/awesome-reversing
ByteShield
https://shell-storm.org/shellcode/index.html
shell-storm.org
Shellcodes database for study cases
ByteShield
https://github.com/H4CK3RT3CH/RedTeaming_CheatSheet
GitHub
GitHub - H4CK3RT3CH/RedTeaming_CheatSheet
Contribute to H4CK3RT3CH/RedTeaming_CheatSheet development by creating an account on GitHub.
ByteShield
https://vladtoie.gitbook.io/secure-coding/
vladtoie.gitbook.io
Secure Coding Handbook
ByteShield
https://www.wiz.io/blog/linux-rootkits-explained-part-1-dynamic-linker-hijacking
By
@AbbyMCH
wiz.io
Linux rootkits explained – Part 1: Dynamic linker hijacking | Wiz Blog
Dynamic linker hijacking via LD_PRELOAD is a Linux rootkit technique utilized by different threat actors in the wild. In part one of this series on Linux rootkits, we discuss this threat and explain how to detect it.
ByteShield
https://learntohack.hac10101.com/
Hacker theme
Home
Hacker is a theme for GitHub Pages.
ByteShield
https://heap-exploitation.dhavalkapil.com/
Dhavalkapil
Preface | heap-exploitation
ByteShield
https://github.com/Ahmed-AL-Maghraby/Windows-Registry-Analysis-Cheat-Sheet
GitHub
GitHub - Ahmed-AL-Maghraby/Windows-Registry-Analysis-Cheat-Sheet
Contribute to Ahmed-AL-Maghraby/Windows-Registry-Analysis-Cheat-Sheet development by creating an account on GitHub.
ByteShield
https://github.com/snowcra5h/Faronics-DeepFreeze-8-Exploit
ByteShield
https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-2
BITSADMIN Blog
Living Off the Foreign Land - Part 2/3: Configuring the Offensive Windows VM
Living Off the Foreign Land (LOFL) allows attackers to use Windows' built-in powerful tooling (LOFLCABs) to attack remote systems. The second part in this 3-part article discusses how to configure the Offensive Windows VM so it can use Kerberos authentication…
ByteShield
https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-3
BITSADMIN Blog
Living Off the Foreign Land - Part 3/3: Using Windows as Offensive Platform
Living Off the Foreign Land (LOFL) allows attackers to use Windows' built-in powerful tooling (LOFLCABs) to attack remote systems. The last part in this 3-part article discusses the various LOFL Cmdlets and Binaries (CABs) that can be used to attack systems…
ByteShield
https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform
BITSADMIN Blog
Living Off the Foreign Land - Part 1/3: Setup Linux VM for SOCKS routing
Living Off the Foreign Land (LOFL) allows attackers to use Windows' built-in powerful tooling (LOFLCABs) to attack remote systems. The first part in this 3-part article discusses how to setup the Linux VM to transparently tunnel traffic over SOCKS. This enables…
ByteShield
https://github.com/b1tg/CVE-2023-38831-winrar-exploit
GitHub
GitHub - b1tg/CVE-2023-38831-winrar-exploit: CVE-2023-38831 winrar exploit generator
CVE-2023-38831 winrar exploit generator. Contribute to b1tg/CVE-2023-38831-winrar-exploit development by creating an account on GitHub.
👍
1
ByteShield
https://web.archive.org/web/20230403234851/https://pre.empt.dev/posts/maelstrom-the-implant/
web.archive.org
pre.empt.dev: Writing a C2 Implant
In this blog, we will discuss how to write a C2 implant for the modern era. We will look at the history of offensive techniques and the progress of defence. We then move into discussing some key concepts before finally writing stage 0, and the implant as…
ByteShield
https://web.archive.org/web/20210413102213/https://security.cs.rpi.edu/courses/hwre-spring2014/
CSCI 4974 / 6974 Hardware Reverse Engineering
ByteShield
https://github.com/RPISEC/MBE#modern-binary-exploitation---csci-4968
GitHub
GitHub - RPISEC/MBE: Course materials for Modern Binary Exploitation by RPISEC
Course materials for Modern Binary Exploitation by RPISEC - RPISEC/MBE
ByteShield
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
GitHub
GitHub - CyberSecurityUP/Awesome-Exploit-Development
Contribute to CyberSecurityUP/Awesome-Exploit-Development development by creating an account on GitHub.
ByteShield
https://medium.com/@moon_osint/how-to-find-the-administrator-of-an-onion-site-89d176b0061a
Medium
How to find the administrator of an onion site?
In this article, I will talk about how administrators of resources in the Tor Network, i.e. the Darkweb, are identified.
ByteShield
https://whiterose-infosec.super.site/mjsxj09cm-recovering-firmware-and-backdooring
MJSXJ09CM - Recovering Firmware and Backdooring
I decided to disassemble the device and take a closer look at the hardware.