“EtherHiding” — Hiding Web2 Malicious Code in Web3 Smart Contracts
https://labs.guard.io/etherhiding-hiding-web2-malicious-code-in-web3-smart-contracts-65ea78efad16?gi=9da8f59fe944
https://labs.guard.io/etherhiding-hiding-web2-malicious-code-in-web3-smart-contracts-65ea78efad16?gi=9da8f59fe944
guard.io
“EtherHiding” — Hiding Web2 Malicious Code in Web3 Smart Contracts
Order of Six Angles
Photo
а то бля заебало про одно байтоёбство читать 😂
BOOMSLANG Mobile fraud family analysis
https://www.liansecurity.com/#/main/news/mlRmJIwB203zX1eeD8-r/detail
https://www.liansecurity.com/#/main/news/mlRmJIwB203zX1eeD8-r/detail
Secret Handshake A Mutual TLS Based C2 Communication Channel - John Conwell | CypherCon 6.0
https://www.youtube.com/watch?v=AOWFM-JhW3g&list=PLUC_sTnMl8NxZqs4b2Rt8VygLaquV5vY_
https://www.youtube.com/watch?v=AOWFM-JhW3g&list=PLUC_sTnMl8NxZqs4b2Rt8VygLaquV5vY_
YouTube
Secret Handshake A Mutual TLS Based C2 Communication Channel - John Conwell | CypherCon 6.0
(S6:E57) Secret Handshake A Mutual TLS Based C2 Communication Channel - John Conwell - CypherCon 6.0 - Wisconsin
Secret Handshake A Mutual TLS Based C2 Communication Channel
One of the goals of malware command & control (C2) communication is to blend into…
Secret Handshake A Mutual TLS Based C2 Communication Channel
One of the goals of malware command & control (C2) communication is to blend into…
Obfuscating native code for fun: Part 1 - Introduction
https://blog.es3n1n.eu/posts/obfuscator-pt-1/
https://github.com/es3n1n/obfuscator
https://blog.es3n1n.eu/posts/obfuscator-pt-1/
https://github.com/es3n1n/obfuscator
blog.es3n1n.eu
Obfuscating native code for fun: Part 1 - Introduction
In this series of posts, I will try to cover all the common knowledge you would need to create your PE bin2bin obfuscator. This year I saw a rise of interest in the topics of software obfuscation and deobfuscation, yet I didn’t see any new open-source projects…
Ghidra Basics - Identifying, Decoding and Fixing Encrypted Strings
https://embee-research.ghost.io/ghidra-basics-identifying-and-decoding-encrypted-strings/
https://embee-research.ghost.io/ghidra-basics-identifying-and-decoding-encrypted-strings/
Embee Research
How To Use Ghidra For Malware Analysis - Identifying, Decoding and Fixing Encrypted Strings
Manual identification, decryption and fixing of encrypted strings using Ghidra and x32dbg.
знаете что мне в голову пришло, на обложке hybrid theory изображен человек с крыльями бабочки стреокозы (?? у стрекозы четыре крыла), и в клипе papercut вылетают стрекозы. интересно связано ли это както или хуйня.
Abusing Liftoff assembly and efficiently escaping from sbx
https://retr0.zip/blog/abusing-Liftoff-assembly-and-efficiently-escaping-from-sbx.html
https://retr0.zip/blog/abusing-Liftoff-assembly-and-efficiently-escaping-from-sbx.html