Source Byte
7.8K subscribers
852 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Abusing the SeRelabelPrivilege
that a specific Group Poilcy granted via “User Right Assignments” the SeRelabelPrivilege to the built-in Users group and was applied on several computer accounts.

https://decoder.cloud/2024/05/30/abusing-the-serelabelprivilege

#malware_dev
5
gargoyle is a technique for hiding all of a program’s executable code in non-executable memory
GitHub
Link
Blog


#malware_dev
54🥱2👍1
DarkPulse is a shellcode packer written in Go. It is used to generate various shellcode loaders.

https://github.com/fdx-xdf/darkPulse

#malware_dev
32
GoThief
Recently, I encountered such a scenario in an attack and defense game. The target machine accessed the internal application system and was uniformly controlled by VPN. After connecting to VPN, the connection with the external network would be disconnected, resulting in the inability to issue commands in real time. Therefore, I had the idea of developing this small tool. By taking screenshots of the keyboard and recording the clipboard, I could obtain the target's operations after connecting to VPN, and collect sensitive information for the next step of lateral movement.

GitHub

#stealer #malware_dev
4🔥2👍1
Check out the full source code of EagleSpy and tailor it to your preferences.

#source
#malware_analysis
#malware_dev #malware
👍22🔥1
An Introduction to Bypassing User Mode EDR Hooks
Credit: Marcus Hutchins
Whilst this article is designed to stand on its own, if you’re interested, you can find my previous articles on these topics here, here, here and here. Surprisingly, despite all this research being over a decade old, it’s still completely relevant today. The more things change, the more they stay the same, I guess?
https://malwaretech.com/2023/12/an-introduction-to-bypassing-user-mode-edr-hooks.html


#Hooking #edr
#malware_dev
🔥2👾2
Introduction global hook and its cases
https://www.programmerall.com/article/21622234988/
hook, refers to a technique used to advance the use of api intercept and process windows messages. Such as a keyboard hook, the Trojans have a lot of this stuff, monitor your keyboard.


Related:
[+] GoHook, Go global keyboard and mouse listener hook

[+] Implementing Global Injection and Hooking in Windows



#Hooking
#malware_dev
👾3🗿1
Source Byte
gargoyle is a technique for hiding all of a program’s executable code in non-executable memory GitHub Link Blog #malware_dev
This media is not supported in your browser
VIEW IN TELEGRAM
Bypassing PESieve and Moneta (The "easy" way....?)
It contains several parts.

Implementation of gargoyle
Lockd: This is the main Gargoyle component
sRDI-Master: This has been slightly re worked to provide a free mechanism.
test.profile: This sample profile shows required options to work
ShellcodeRDI.py: This is the altered python generator with the new sRDI assembly

+ Blog
+ GitHub


#malware_dev
👾5👍2