ByteShield
1.29K subscribers
99 photos
32 videos
107 files
519 links
Download Telegram
ByteShield pinned «Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) · 0x44.cc https://0x44.cc/reversing/2021/07/21/reversing-x86-and-c-code-for-beginners.html»
🖤🖤🖤
😢4
EXPECT US
ByteShield pinned «EXPECT US»
😢4
😎😎
3
😎😎
2
😎😎
2
This media is not supported in your browser
VIEW IN TELEGRAM
You started this war, but we will draw its end.
Forwarded from Source Byte
MacOS hacking part 2: classic injection trick into macOS applications. Simple C example by cocomelonc

#APT34 (aka OILRIG) is known to use code injection techniques to interact with macOS and Linux systems, leveraging vulnerabilities and weaknesses in the system’s security mechanisms to inject code into running processes.

#APT10 (aka Red Apollo), another advanced Chinese group, has been known to use techniques like process injection and DLL hijacking to manipulate and monitor systems. This is conceptually similar to DYLD_INSERT_LIBRARIES because it involves injecting malicious code into existing applications.
Handala is cooking 🔥🔥
🔥1