Forwarded from Source Byte ( P҉d҉y҉👾)
DLL Hijacking Overview.pdf
249.1 KB
DLL Hijacking Overview.pdf
Forwarded from 𝗣𝗥𝗜𝗩𝗔𝗧𝗘 𝗛𝗨𝗕 🇮🇳 (HACKOWEB)
Android Hacking Class 👾
⭐️ Time - 14 May | 7pm
⭐️ Teacher - @MrMorningxtar 💙
Be Ready Guys Give Reaction🦝
Be Ready Guys Give Reaction
Please open Telegram to view this post
VIEW IN TELEGRAM
❤7🔥1
Forwarded from 𝗣𝗥𝗜𝗩𝗔𝗧𝗘 𝗛𝗨𝗕 🇮🇳 (HACKOWEB)
Please open Telegram to view this post
VIEW IN TELEGRAM
❤7🔥1
Forwarded from 𝗣𝗥𝗜𝗩𝗔𝗧𝗘 𝗛𝗨𝗕 🇮🇳 (HACKOWEB)
Please open Telegram to view this post
VIEW IN TELEGRAM
❤7👏1
Forwarded from 𝗣𝗥𝗜𝗩𝗔𝗧𝗘 𝗛𝗨𝗕 🇮🇳 (HACKOWEB)
Complete Reverse Engineering And Software Cracking Course 🔒
⭐️ Parts - Soon
⭐️ Language - Hindi
Complete 100+ Reaction⚠️
Complete 100+ Reaction
Please open Telegram to view this post
VIEW IN TELEGRAM
❤11👍5🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
An Israeli police officer strangled and killed a Palestinian child during a protest against the American embassy in Jerusalem on Saturday. The innocent boy read the testimonies even before his death. Despite many efforts of groups to upload this video on Youtube, it is continuously removed and removed from google, facebook and youtube.
Please play this video at high level
to reach all media.
Please play this video at high level
to reach all media.
😢2👍1👎1
#Android #CVE_2024_0044
Android 12/13 Autorooter:
https://github.com/scs-labrat/android_autorooter
Based on a PoC that allows you to access data from other applications:
https://github.com/pl4int3xt/cve_2024_0044
Android 12/13 Autorooter:
https://github.com/scs-labrat/android_autorooter
Based on a PoC that allows you to access data from other applications:
https://github.com/pl4int3xt/cve_2024_0044
GitHub
GitHub - scs-labrat/android_autorooter: Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability…
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely - scs-labrat/android_autorooter
#rootkits
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1
Cyberark
Fantastic Rootkits: And Where to Find Them (Part 1)
Introduction In this blog series, we will cover the topic of rootkits — how they are built and the basics of kernel driver analysis — specifically on the Windows platform. In this first part, we...
#rootkits
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-2
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-2
Cyberark
Fantastic Rootkits and Where to Find Them (Part 2)
Know Your Enemy In the previous post (Part 1), we covered several rootkit technique implementations. Now we will focus on kernel rootkit analysis, looking at two case studies of rootkits found in...
#rootkits
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-3-arm-edition
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-3-arm-edition
Cyberark
Fantastic Rootkits: And Where To Find Them (Part 3) – ARM Edition
Introduction In this blog, we will discuss innovative rootkit techniques on a non-traditional architecture, Windows 11 on ARM64. In the prior posts, we covered rootkit techniques applied to a...
👍1
kurogai/100-redteam-projects: Projects for security students
https://github.com/kurogai/100-redteam-projects
https://github.com/kurogai/100-redteam-projects
GitHub
GitHub - kurogai/100-redteam-projects: Projects for security students
Projects for security students. Contribute to kurogai/100-redteam-projects development by creating an account on GitHub.