Black hat usa 2024 slides
https://drive.google.com/drive/u/0/mobile/folders/1nCCA7VB3Ez-F2BfiAIFWr2z_frxGRWhd
https://drive.google.com/drive/u/0/mobile/folders/1nCCA7VB3Ez-F2BfiAIFWr2z_frxGRWhd
🔥6
Malware Development
#malware
Part I - Analysis and DFIR Series
Part II - Analysis and DFIR Series
Part III - Analysis and DFIR Series
Part IV - Analysis and DFIR
#malware
Part I - Analysis and DFIR Series
Part II - Analysis and DFIR Series
Part III - Analysis and DFIR Series
Part IV - Analysis and DFIR
azr43lkn1ght.github.io
Malware Development, Analysis and DFIR Series - Part I
1st post of Malware Development, Analysis and DFIR Series. This post will be focussed on developing Malwares for ethical purposes only, The author is not liable for any damages caused.
👍5
Mastering the Art of Bypassing Windows UAC
https://hadess.io/user-account-control-uncontrol-mastering-the-art-of-bypassing-windows-uac/
https://hadess.io/user-account-control-uncontrol-mastering-the-art-of-bypassing-windows-uac/
𝗢𝗵𝗦𝗛𝗜𝗡𝗧
•Introduction to OSINT Web Resources
•Search Engines
•Social Media Intelligence [SOCMINT]
•Mapping and Geospatial Intelligence [GEOINT]
•Imagery Intelligence [IMINT]
•Orbital Intelligence [ORBINT]
•Business Research and Trade Intelligence [TRADINT]
•Financial Intelligence [FININT]
•Vehicle and Transportation Intelligence [VATINT]
•Digital Network Intelligence [DNINT]
•Signals Intelligence [SIGINT]
•Deep Webs and Darknets
•People Investigations
•Email Addresses
•Phone Numbers
•Usernames
•Gaming
•Real Estate
•Data Sets
•Organized Crime and Illicit Trade
•Stolen Property
•War, Crisis and Conflicts
•Weapons and Equipment •Identification
•Government Information
•Dictionaries, Translation and •Decoding
https://ohshint.gitbook.io/oh-shint-its-a-blog
•Introduction to OSINT Web Resources
•Search Engines
•Social Media Intelligence [SOCMINT]
•Mapping and Geospatial Intelligence [GEOINT]
•Imagery Intelligence [IMINT]
•Orbital Intelligence [ORBINT]
•Business Research and Trade Intelligence [TRADINT]
•Financial Intelligence [FININT]
•Vehicle and Transportation Intelligence [VATINT]
•Digital Network Intelligence [DNINT]
•Signals Intelligence [SIGINT]
•Deep Webs and Darknets
•People Investigations
•Email Addresses
•Phone Numbers
•Usernames
•Gaming
•Real Estate
•Data Sets
•Organized Crime and Illicit Trade
•Stolen Property
•War, Crisis and Conflicts
•Weapons and Equipment •Identification
•Government Information
•Dictionaries, Translation and •Decoding
https://ohshint.gitbook.io/oh-shint-its-a-blog
ohshint.gitbook.io
OH SHINT! Welcome Aboard | OH SHINT! It's A Blog!
So what is this site all about? Yep, it's an OSINT blog.
A couple of interesting blog posts on hiding Linux processes
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
#Linux
#Cybersecurity
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
#Linux
#Cybersecurity
dfir.ch
The 'Invisibility Cloak' - Slash-Proc Magic | dfir.ch
Technical blog by Stephan Berger (@malmoeb)
Intro to glibc heap exploitation (HitconCTF, glibc 2.31)
Credits Tom Mansion (@quarkslab)
https://blog.quarkslab.com/heap-exploitation-glibc-internals-and-nifty-tricks.html
Credits Tom Mansion (@quarkslab)
https://blog.quarkslab.com/heap-exploitation-glibc-internals-and-nifty-tricks.html
Quarkslab
Heap exploitation, glibc internals and nifty tricks. - Quarkslab's blog
This is a writeup of a heap pwn challenge at HitconCTF Qualifiers 2024, which explains some glibc malloc internals and some heap exploitation tricks that can be used for getting a shell!
GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
GitHub
GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
Reverse engineering focusing on x64 Windows. Contribute to 0xZ0F/Z0FCourse_ReverseEngineering development by creating an account on GitHub.
👍3