Forwarded from Security Analysis (Adel)
⭕️یک Stealer جالب برای Exfitrate Office Documents به زبان ++C و Python نوشته شده که با استفاده از API مربوط به Virustotal داده را استخراج کرده و به Server c2 مورد نظر منتقل میکند.
https://github.com/TheD1rkMtr/VT-stealer
#RedTeam #Tools
@securation
https://github.com/TheD1rkMtr/VT-stealer
#RedTeam #Tools
@securation
❤1
#tools
#Threat_Research
Awesome GPTs (Agents) for Cybersecurity
https://github.com/fr0gger/Awesome-GPT-Agents
#Threat_Research
Awesome GPTs (Agents) for Cybersecurity
https://github.com/fr0gger/Awesome-GPT-Agents
GitHub
GitHub - fr0gger/Awesome-GPT-Agents: A curated list of GPT agents for cybersecurity
A curated list of GPT agents for cybersecurity. Contribute to fr0gger/Awesome-GPT-Agents development by creating an account on GitHub.
Use the free Microsoft bing's gpt with ida pro, to perform free analyzes!
https://github.com/p1ay8y3ar/idaBingGPTPlugin
#tools #reverse #idapro #ai
https://github.com/p1ay8y3ar/idaBingGPTPlugin
#tools #reverse #idapro #ai
🎃3
https://github.com/0xEr3bus/PoolPartyBof
A beacon object file implementation of PoolParty Process Injection Technique.
#github #tools #cs
A beacon object file implementation of PoolParty Process Injection Technique.
#github #tools #cs
GitHub
GitHub - 0xEr3bus/PoolPartyBof: A beacon object file implementation of PoolParty Process Injection Technique.
A beacon object file implementation of PoolParty Process Injection Technique. - 0xEr3bus/PoolPartyBof
❤🔥1
Source Byte
https://www.safebreach.com/blog/process-injection-using-windows-thread-pools/
A set of fully-undetectable process injection techniques abusing Windows Thread Pools
https://github.com/SafeBreach-Labs/PoolParty
#process_injection , #tools
https://github.com/SafeBreach-Labs/PoolParty
#process_injection , #tools
❤🔥2🎃1
Media is too big
VIEW IN TELEGRAM
Python training series focusing on tool development
The topic of this session: starting with Python language and variable types
#python ,#tools_development ,
language : persian
👍4
Introducing APT-Hunter : Threat Hunting Tool via Windows Event Log
https://shells.systems/introducing-apt-hunter-threat-hunting-tool-via-windows-event-log/
#tools
https://shells.systems/introducing-apt-hunter-threat-hunting-tool-via-windows-event-log/
#tools
Sark (named after the notorious Tron villain) is an object-oriented scripting layer written on top of IDAPython. Sark is easy to use and provides tools for writing advanced scripts and plugins.
https://sark.readthedocs.io/en/latest/
#tools
https://sark.readthedocs.io/en/latest/
#tools
Forwarded from کانال بایت امن
#Tools
CM64 a x64 freezer/debugger for windows.
Features :
🦅 کانال بایت امن | گروه بایت امن
_
CM64 a x64 freezer/debugger for windows.
Features :
Simple and familiar user interface
Hexbased expression parser
Full-featured kernel memory edit, save and load
Follow jump and back
Memory map
Modules thread view
Register view
Full memory search
Fast assmbler/disassembler (Zydis 4.0.0)
Plugin support with growing API
ASCII/Hex memory dump
Dynamic stack view
Executable patching
Game cheat engine trainer
Full IO ports read and write
Windows service API investigator
Save and load binary files
Virtual / physical address converter and mapper
Full PCI bus viewer
Full kernel drivers structre viewer
Full user mode processes structure viewer
Full system BIOS structure viewer
System ACPI structure viewer
Special boot control featrure
Debug Windows kernel and processes without Windows global flag enabled or any process in debug mode
_
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2👎1👏1
Forwarded from کانال بایت امن
#Article #Tools
چند مقاله و ابزار درباره ساختار PE قبلاً در وبلاگ قرار داده بودم که امروز اونها رو بهروزرسانی کردم. سورسکدها و ویدیوهای دمو هم اضافه شده تا این مفاهیم بهتر قابل درک باشن و راحتتر بتونید با موضوع ساختار PE ارتباط برقرار کنید.
⬅️ بررسی و تحلیل Checksum در ساختار PE
⬅️ بررسی و تشریح DEP و ASLR در ساختار PE
⬅️ ابزار تبدیل DLL به EXE
⬅️ ابزار حذف DEP و ASLR از ساختار PE
⬅️ ابزار تصحیح Checksum در ساختار PE
🦅 کانال بایت امن | گروه بایت امن
_
چند مقاله و ابزار درباره ساختار PE قبلاً در وبلاگ قرار داده بودم که امروز اونها رو بهروزرسانی کردم. سورسکدها و ویدیوهای دمو هم اضافه شده تا این مفاهیم بهتر قابل درک باشن و راحتتر بتونید با موضوع ساختار PE ارتباط برقرار کنید.
_
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5❤2
Forwarded from CyberSecurityTechnologies
HarmonyOS_NEXT_Offensive_Testing.pdf
3.8 MB
#tools
#Mobile_Security
"Breaking The Harmony: Offensive Testing Of HarmonyOS NEXT Applications With Harm0nyz3r & DVHA", Black Hat Europe 2025.
]-> Harmony OS Next Analysis Tool
]-> Damn Vulnerable Harmony Application
// This talk presents the results of a security assessment of HarmonyOS NEXT and its application ecosystem, combining a custom-built testing framework (Harm0nyz3r) with a purposely vulnerable application (Damn Vulnerable HarmonyOS Application - DVHA). Live demonstrations will show how Harm0nyz3r maps an application's attack surface, crafts malicious payloads, and successfully exploits vulnerabilities in DVHA..
#Mobile_Security
"Breaking The Harmony: Offensive Testing Of HarmonyOS NEXT Applications With Harm0nyz3r & DVHA", Black Hat Europe 2025.
]-> Harmony OS Next Analysis Tool
]-> Damn Vulnerable Harmony Application
// This talk presents the results of a security assessment of HarmonyOS NEXT and its application ecosystem, combining a custom-built testing framework (Harm0nyz3r) with a purposely vulnerable application (Damn Vulnerable HarmonyOS Application - DVHA). Live demonstrations will show how Harm0nyz3r maps an application's attack surface, crafts malicious payloads, and successfully exploits vulnerabilities in DVHA..
❤6