Source Byte
7.8K subscribers
852 photos
73 videos
678 files
1.68K links
هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187
Download Telegram
Forwarded from Security Analysis (Adel)
⭕️یک ‏Stealer جالب برای Exfitrate Office Documents به زبان ++C و Python نوشته شده که با استفاده از API مربوط به Virustotal داده را استخراج کرده و به Server c2 مورد نظر منتقل میکند.

https://github.com/TheD1rkMtr/VT-stealer
#RedTeam #Tools

@securation
1
Use the free Microsoft bing's gpt with ida pro, to perform free analyzes!

https://github.com/p1ay8y3ar/idaBingGPTPlugin

#tools #reverse #idapro #ai
🎃3
Source Byte
https://www.safebreach.com/blog/process-injection-using-windows-thread-pools/
A set of fully-undetectable process injection techniques abusing Windows Thread Pools

https://github.com/SafeBreach-Labs/PoolParty

#process_injection , #tools
❤‍🔥2🎃1
Media is too big
VIEW IN TELEGRAM
#advertisment -> join our sister channel -> @sec_hint

Python training series focusing on tool development
The topic of this session: starting with Python language and variable types

#python ,#tools_development ,

language : persian
👍4
Introducing APT-Hunter : Threat Hunting Tool via Windows Event Log

https://shells.systems/introducing-apt-hunter-threat-hunting-tool-via-windows-event-log/

#tools
Sark (named after the notorious Tron villain) is an object-oriented scripting layer written on top of IDAPython. Sark is easy to use and provides tools for writing advanced scripts and plugins.


https://sark.readthedocs.io/en/latest/


#tools
#Tools

CM64 a x64 freezer/debugger for windows.

Features :

Simple and familiar user interface
Hexbased expression parser
Full-featured kernel memory edit, save and load
Follow jump and back
Memory map
Modules thread view
Register view
Full memory search
Fast assmbler/disassembler (Zydis 4.0.0)
Plugin support with growing API
ASCII/Hex memory dump
Dynamic stack view
Executable patching
Game cheat engine trainer
Full IO ports read and write
Windows service API investigator
Save and load binary files
Virtual / physical address converter and mapper
Full PCI bus viewer
Full kernel drivers structre viewer
Full user mode processes structure viewer
Full system BIOS structure viewer
System ACPI structure viewer
Special boot control featrure
Debug Windows kernel and processes without Windows global flag enabled or any process in debug mode


🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2👎1👏1
#Article #Tools

چند مقاله و ابزار درباره ساختار PE قبلاً در وبلاگ قرار داده بودم که امروز اون‌ها رو به‌روزرسانی کردم. سورس‌کدها و ویدیوهای دمو هم اضافه شده تا این مفاهیم بهتر قابل درک باشن و راحت‌تر بتونید با موضوع ساختار PE ارتباط برقرار کنید.

⬅️بررسی و تحلیل Checksum در ساختار PE
⬅️بررسی و تشریح DEP و ASLR در ساختار PE
⬅️ابزار تبدیل DLL به EXE
⬅️ابزار حذف DEP و ASLR از ساختار PE
⬅️ابزار تصحیح Checksum در ساختار PE

🦅 کانال بایت امن | گروه بایت امن
_
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥52
Forwarded from CyberSecurityTechnologies
HarmonyOS_NEXT_Offensive_Testing.pdf
3.8 MB
#tools
#Mobile_Security
"Breaking The Harmony: Offensive Testing Of HarmonyOS NEXT Applications With Harm0nyz3r & DVHA", Black Hat Europe 2025.
]-> Harmony OS Next Analysis Tool
]-> Damn Vulnerable Harmony Application

// This talk presents the results of a security assessment of HarmonyOS NEXT and its application ecosystem, combining a custom-built testing framework (Harm0nyz3r) with a purposely vulnerable application (Damn Vulnerable HarmonyOS Application - DVHA). Live demonstrations will show how Harm0nyz3r maps an application's attack surface, crafts malicious payloads, and successfully exploits vulnerabilities in DVHA..
6