Forwarded from Mohamed Saleh
debugging.pdf
8.1 MB
Windows Debugging Disassembling Reversing SE - Practical Foundation
reversing.pdf
7 MB
Reversing Disassembly Reconstruction Accelerated
malware.pdf
7.8 MB
Windows Malware Analysis Accelerated With Memory Dumps
advanced.pdf
7.3 MB
Windows Memory Dump Analysis Advanced With Data Structure
๐4
Forwarded from Source Byte (โ โ โ โ โ โ โ โ โPาdาyา๐พ)
DLL Hijacking Overview.pdf
249.1 KB
DLL Hijacking Overview.pdf
Forwarded from ๐ฃ๐ฅ๐๐ฉ๐๐ง๐ ๐๐จ๐ ๐ฎ๐ณ (๏ผจ๏ผก๏ผฃ๏ผซ๏ผฏ๏ผท๏ผฅ๏ผข)
Android Hacking Class ๐พ
โญ๏ธ Time - 14 May | 7pm
โญ๏ธ Teacher - @MrMorningxtar ๐
Be Ready Guys Give Reaction๐ฆ
Be Ready Guys Give Reaction
Please open Telegram to view this post
VIEW IN TELEGRAM
โค7๐ฅ1
Forwarded from ๐ฃ๐ฅ๐๐ฉ๐๐ง๐ ๐๐จ๐ ๐ฎ๐ณ (๏ผจ๏ผก๏ผฃ๏ผซ๏ผฏ๏ผท๏ผฅ๏ผข)
Please open Telegram to view this post
VIEW IN TELEGRAM
โค7๐ฅ1
Forwarded from ๐ฃ๐ฅ๐๐ฉ๐๐ง๐ ๐๐จ๐ ๐ฎ๐ณ (๏ผจ๏ผก๏ผฃ๏ผซ๏ผฏ๏ผท๏ผฅ๏ผข)
Please open Telegram to view this post
VIEW IN TELEGRAM
โค7๐1
Forwarded from ๐ฃ๐ฅ๐๐ฉ๐๐ง๐ ๐๐จ๐ ๐ฎ๐ณ (๏ผจ๏ผก๏ผฃ๏ผซ๏ผฏ๏ผท๏ผฅ๏ผข)
Complete Reverse Engineering And Software Cracking Course ๐
โญ๏ธ Parts - Soon
โญ๏ธ Language - Hindi
Complete 100+ Reactionโ ๏ธ
Complete 100+ Reaction
Please open Telegram to view this post
VIEW IN TELEGRAM
โค11๐5๐ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
An Israeli police officer strangled and killed a Palestinian child during a protest against the American embassy in Jerusalem on Saturday. The innocent boy read the testimonies even before his death. Despite many efforts of groups to upload this video on Youtube, it is continuously removed and removed from google, facebook and youtube.
Please play this video at high level
to reach all media.
Please play this video at high level
to reach all media.
๐ข2๐1๐1
Forwarded from ุบุฒุฉ ุงูุขู - Gaza Now
ุงูุง ููู ูุงูุง ุงููู ุฑุงุฌุนูู ๐ต๐ธ
๐ข12๐คฉ4โคโ๐ฅ2๐ฅ2๐1
#Android #CVE_2024_0044
Android 12/13 Autorooter:
https://github.com/scs-labrat/android_autorooter
Based on a PoC that allows you to access data from other applications:
https://github.com/pl4int3xt/cve_2024_0044
Android 12/13 Autorooter:
https://github.com/scs-labrat/android_autorooter
Based on a PoC that allows you to access data from other applications:
https://github.com/pl4int3xt/cve_2024_0044
GitHub
GitHub - scs-labrat/android_autorooter: Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerabilityโฆ
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely - scs-labrat/android_autorooter
#rootkits
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1
Cyberark
Fantastic Rootkits: And Where to Find Them (Part 1)
Introduction In this blog series, we will cover the topic of rootkits โ how they are built and the basics of kernel driver analysis โ specifically on the Windows platform. In this first part, we...
#rootkits
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-2
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-2
Cyberark
Fantastic Rootkits and Where to Find Them (Part 2)
Know Your Enemy In the previous post (Part 1), we covered several rootkit technique implementations. Now we will focus on kernel rootkit analysis, looking at two case studies of rootkits found in...
#rootkits
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-3-arm-edition
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-3-arm-edition
Cyberark
Fantastic Rootkits: And Where To Find Them (Part 3) โ ARM Edition
Introduction In this blog, we will discuss innovative rootkit techniques on a non-traditional architecture, Windows 11 on ARM64. In the prior posts, we covered rootkit techniques applied to a...
๐1