Keylogging in the Windows kernel with undocumented data structures
https://eversinc33.com/posts/kernel-mode-keylogging/
#malware
https://eversinc33.com/posts/kernel-mode-keylogging/
#malware
ByteShield pinned ยซhttps://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md?s=35 https://t.iss.one/BinaryWorlddยป
Creating a Rootkit to Learn C
https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/
https://h0mbre.github.io/Learn-C-By-Creating-A-Rootkit/
The Human Machine Interface
Creating a Rootkit to Learn C
Background Information This post is my solution for the last assignment in my Learning-C repository. I thought a good way to cap off a repo designed to introduce people to very basic C programming would be to take those very basic techinques and make a simpleโฆ
๐3
#osint
How can find email of GitHub user ?
Go to repository of github user and open any commits in repository and append .patch to end of URL
How can find email of GitHub user ?
Go to repository of github user and open any commits in repository and append .patch to end of URL
This example commit page
https://github.com/mahmad00/Disjoint-Sampling-for-Hyperspectral-Image-Classification/commit/d8ff4b6fe9c0de8db712812bf7966b3ed66b82cc
https://github.com/mahmad00/Disjoint-Sampling-for-Hyperspectral-Image-Classification/commit/d8ff4b6fe9c0de8db712812bf7966b3ed66b82cc
GitHub
Update README.md ยท mahmad00/Disjoint-Sampling-for-Hyperspectral-Image-Classification@d8ff4b6
Disjoint-Sampling-for-Hyperspectral-Image-Classification - mahmad00/Disjoint-Sampling-for-Hyperspectral-Image-Classification
Forwarded from RedBlueTM Hit (๐โ า๏ธา าโฎาโฑงา๐า าโฒาโฑงา๐าโดาโฎา าโ า๏ธา๐)
#SensePost | Applied Web Application Hacking
Info: https://www.orangecyberdefense.com/global/datasheets/sensepost-awah
Pass:
@Hide01 ๐ฐ
@RedBlueHit ๐๐
@RedBlueTM ๐
Info: https://www.orangecyberdefense.com/global/datasheets/sensepost-awah
Pass:
@hexleakworld@Hide01 ๐ฐ
@RedBlueHit ๐๐
@RedBlueTM ๐
Forwarded from RedBlueTM Hit (Hide01)
#First_Time_Ever ๐ฅ
#Exclusive๐ฅ
FOR585: Smartphone Forensic Analysis In-Depth 2022 [Latest]๐ฅ
๐ Download: https://hide01.ir/smartphone-forensic-analysis-in-depth
๐ How to download the course? Please visit this links๐๐ป
https://hide01.ir/usage
https://t.iss.one/Hide01/509
@Hide01 ๐ฐ
@RedBlueHit ๐๐
@RedBlueTM ๐
#Exclusive
FOR585: Smartphone Forensic Analysis In-Depth 2022 [Latest]
https://hide01.ir/usage
https://t.iss.one/Hide01/509
@Hide01 ๐ฐ
@RedBlueHit ๐๐
@RedBlueTM ๐
Please open Telegram to view this post
VIEW IN TELEGRAM
Imam Ali ( Peace be Upon Him ) addressing his son: My son! One who associates with scholars and intellectuals will gain greatness from them, and one who associates with low life people will become low life and insignificant.
#FollowerOfAli
#FollowerOfAli
โค5๐2
Malware Development Series:
Malware development: persistence - part 1. Registry run keys. C++ example.
Malware development: persistence - part 2. Screensaver hijack. C++ example.
Malware development: persistence - part 3. COM DLL hijack.
Malware development: persistence - part 4. Windows services. Simple C++ example.
Malware development: persistence - part 5. AppInit_DLLs. Simple C++ example.
Malware development: persistence - part 6. Windows netsh helper DLL. Simple C++ example.
Malware AV evasion: part 7. Disable Windows Defender. Simple C++ example.
Malware AV evasion - part 8. Encode payload via Z85 algorithm. C++ example.
Malware AV evasion - part 9. Encrypt base64 encoded payload via RC4. C++ example.
Malware AV/VM evasion - part 10: anti-debugging. NtGlobalFlag. Simple C++ example.
Malware AV/VM evasion - part 11: encrypt payload via DES. Simple C++ example.
Malware AV/VM evasion - part 12: encrypt/decrypt payload via TEA. Simple C++ example.
Malware AV/VM evasion - part 13: encrypt/decrypt payload via Madryga. Simple C++ example.
Malware AV/VM evasion - part 14: encrypt/decrypt payload via A5/1. Bypass Kaspersky AV. Simple C++ example.
Malware AV/VM evasion - part 15: WinAPI GetModuleHandle implementation. Simple C++ example.
Malware AV/VM evasion - part 16: WinAPI GetProcAddress implementation. Simple C++ example.
Malware AV/VM evasion - part 17: bypass UAC via fodhelper.exe. Simple C++ example.
Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.
Malware development: persistence - part 22. Windows Setup. Simple C++ example.
Malware and cryptography 1: encrypt/decrypt payload via RC5. Simple C++ example.
Malware and cryptography 20: encrypt/decrypt payload via Skipjack. Simple C++ example.
Malware and cryptography 21: encrypt/decrypt payload via WAKE. Simple C++ example.
Malware development: persistence - part 23. LNK files. Simple Powershell example.
Malware development: persistence - part 24. StartupApproved. Simple C example.
Malware and cryptography 22: encrypt/decrypt payload via XTEA. Simple C++ example.
Malware and cryptography 23: encrypt/decrypt file via TEA. Simple C/C++ example.
Malware and cryptography 24: encrypt/decrypt file via Madryga. Simple C/C++ example.
Malware and cryptography 25: encrypt/decrypt payload via RC6. Simple C/C++ example.
Malware AV/VM evasion - part 15: WinAPI GetModuleHandle implementation. Simple C++ example.
Malware AV/VM evasion - part 16: WinAPI GetProcAddress implementation. Simple C++ example.
Malware AV/VM evasion - part 17: bypass UAC via fodhelper.exe. Simple C++ example.
Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.
Malware development: persistence - part 22. Windows Setup. Simple C++ example.
Malware and cryptography 1: encrypt/decrypt payload via RC5. Simple C++ example.
Malware and cryptography 20: encrypt/decrypt payload via Skipjack. Simple C++ example.
Malware and cryptography 21: encrypt/decrypt payload via WAKE. Simple C++ example.
#malware
#cpp
Malware development: persistence - part 1. Registry run keys. C++ example.
Malware development: persistence - part 2. Screensaver hijack. C++ example.
Malware development: persistence - part 3. COM DLL hijack.
Malware development: persistence - part 4. Windows services. Simple C++ example.
Malware development: persistence - part 5. AppInit_DLLs. Simple C++ example.
Malware development: persistence - part 6. Windows netsh helper DLL. Simple C++ example.
Malware AV evasion: part 7. Disable Windows Defender. Simple C++ example.
Malware AV evasion - part 8. Encode payload via Z85 algorithm. C++ example.
Malware AV evasion - part 9. Encrypt base64 encoded payload via RC4. C++ example.
Malware AV/VM evasion - part 10: anti-debugging. NtGlobalFlag. Simple C++ example.
Malware AV/VM evasion - part 11: encrypt payload via DES. Simple C++ example.
Malware AV/VM evasion - part 12: encrypt/decrypt payload via TEA. Simple C++ example.
Malware AV/VM evasion - part 13: encrypt/decrypt payload via Madryga. Simple C++ example.
Malware AV/VM evasion - part 14: encrypt/decrypt payload via A5/1. Bypass Kaspersky AV. Simple C++ example.
Malware AV/VM evasion - part 15: WinAPI GetModuleHandle implementation. Simple C++ example.
Malware AV/VM evasion - part 16: WinAPI GetProcAddress implementation. Simple C++ example.
Malware AV/VM evasion - part 17: bypass UAC via fodhelper.exe. Simple C++ example.
Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.
Malware development: persistence - part 22. Windows Setup. Simple C++ example.
Malware and cryptography 1: encrypt/decrypt payload via RC5. Simple C++ example.
Malware and cryptography 20: encrypt/decrypt payload via Skipjack. Simple C++ example.
Malware and cryptography 21: encrypt/decrypt payload via WAKE. Simple C++ example.
Malware development: persistence - part 23. LNK files. Simple Powershell example.
Malware development: persistence - part 24. StartupApproved. Simple C example.
Malware and cryptography 22: encrypt/decrypt payload via XTEA. Simple C++ example.
Malware and cryptography 23: encrypt/decrypt file via TEA. Simple C/C++ example.
Malware and cryptography 24: encrypt/decrypt file via Madryga. Simple C/C++ example.
Malware and cryptography 25: encrypt/decrypt payload via RC6. Simple C/C++ example.
Malware AV/VM evasion - part 15: WinAPI GetModuleHandle implementation. Simple C++ example.
Malware AV/VM evasion - part 16: WinAPI GetProcAddress implementation. Simple C++ example.
Malware AV/VM evasion - part 17: bypass UAC via fodhelper.exe. Simple C++ example.
Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.
Malware development: persistence - part 22. Windows Setup. Simple C++ example.
Malware and cryptography 1: encrypt/decrypt payload via RC5. Simple C++ example.
Malware and cryptography 20: encrypt/decrypt payload via Skipjack. Simple C++ example.
Malware and cryptography 21: encrypt/decrypt payload via WAKE. Simple C++ example.
#malware
#cpp
cocomelonc
Malware development: persistence - part 1. Registry run keys. C++ example.
๏ทฝ
๐ฅ2
pwn.college is an education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion. In martial arts terms, it is designed to take a โwhite beltโ in cybersecurity through the journey to becoming a โblue beltโ, able to approach (simple) cybersecurity competitions (CTFs) and wargames. Our philosophy is โpractice makes perfectโ.
pwn.college
pwn.college
๐ฅ1