مدرس : محمد رضا رمضانی
Chapter 0 – Introduction (Completed)
Chapter 1 – Concepts and tools (Completed)
Chapter 2 – System architecture (Completed)
(In Progress) Chapter 3 – Processes and jobs
Chapter 4 – Threads
NOT COMPLETED PARTS :
Chapter 5 – Memory management
Chapter 6 – I/O system
Chapter 7 – Security
BLOG
#windows_internls
👍2🐳2
Source Byte
دوره ویندوز اینترنال > زبان فارسی
مدرس : ابولفضل کاظمی
video index :
00) Windows Internals Course Introduction
01.00) Threads Chapter Introduction
01.01) WinAPI Threads Introduction
01.02) WinAPI Thread Programming
01.03) WinAPI Thread Pools Introduction
01.04) WinAPI Thread Pool Callbacks Programming
01.05) Windows Kernel Modules Introduction
01.06) Beginning Windows Kernel Module Programming
01.07) Programming a Windows Kernel Thread
01.08) Remote Threads and DLL Injection Introduction
01.09) Using CreateRemoteThread for Code Injection
01.10) Thread Scheduling Concepts
01.11) Thread Scheduling Demo
02.00) Debugging Chapter Introduction
02.01) Compilation and Execution
02.02) x86 Assembly Review
02.03) x86 Assembly Demo
02.04) 64bit Assembly Demo
02.05) Visual Studio Debugging Tips
#windows_internls
مدرس : ابولفضل کاظمی
video index :
01.00) Threads Chapter Introduction
01.01) WinAPI Threads Introduction
01.02) WinAPI Thread Programming
01.03) WinAPI Thread Pools Introduction
01.04) WinAPI Thread Pool Callbacks Programming
01.05)
01.06) Beginning
01.07) Programming a
01.08) Remote Threads and DLL Injection Introduction
01.09) Using CreateRemoteThread for Code Injection
01.10) Thread Scheduling Concepts
01.11) Thread Scheduling Demo
02.00) Debugging Chapter Introduction
02.01) Compilation and Execution
02.02) x86 Assembly Review
02.03) x86 Assembly Demo
02.04) 64bit Assembly Demo
02.05) Visual Studio Debugging Tips
#windows_internls
🔥5
Source Byte
The course "Windows Internals for RedTeaming" taught by "Parsa Sarafian" is published for free.
This course is published weekly in the form of 14 videos.
The video of the first session of the free course "Windows Internals for RedTeaming" has been published. You can watch this video from the link below in Ravin Academy aparat account.
https://aparat.com/v/fqwoh
language : persian
#windows_internls
This course is published weekly in the form of 14 videos.
The video of the first session of the free course "Windows Internals for RedTeaming" has been published. You can watch this video from the link below in Ravin Academy aparat account.
https://aparat.com/v/fqwoh
language : persian
#windows_internls
Translucent Kernel Memory Access from Usermode
themalwareman.com/Translucen…
#windows_internls , #kernel_mode , #user_mode
themalwareman.com/Translucen…
#windows_internls , #kernel_mode , #user_mode
Excellent guide by dhaval kapil on glibc heap internals and exploitation techniques
heap-exploitation.dhavalkapi…
#exploit , #heap , #windows_internls
heap-exploitation.dhavalkapi…
#exploit , #heap , #windows_internls
Direct system calls vs. indirect system calls
https://xss.is/threads/97422/
#syscall , #windows_internls
https://xss.is/threads/97422/
#syscall , #windows_internls
Source Byte
Jonathan Reiter is the Authors of sans SEC670 (Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control) so don't miss this one ! https://www.sans.org/webcasts/intro-c-windows-devs/ --> LINK @islemolecule_SOURCE
part 5 is coming , don't miss it !!!
Part 5 - Intro to C for #Windows
Linked list enumeration, #API, and #windows_internls
I don't know if you all are keeping track, this is now 10(!) FREE hours of hands-on training in C from SANS SEC670 author @jon__reiter
Register here : https://sans.org/u/1u3Z
i will share recorded video in group also
Part 5 - Intro to C for #Windows
Linked list enumeration, #API, and #windows_internls
I don't know if you all are keeping track, this is now 10(!) FREE hours of hands-on training in C from SANS SEC670 author @jon__reiter
Register here : https://sans.org/u/1u3Z
❤🔥2
Windows CLFS and five exploits used by ransomware operators
https://securelist.com/windows-clfs-exploits-ransomware/111560/
#windows_internls , #CLFS
https://securelist.com/windows-clfs-exploits-ransomware/111560/
#windows_internls , #CLFS
Understanding Windows x64 Assembly
credit : @therealdreg
https://sonictk.github.io/asm_tutorial/
#windows_internls , #assembly ,
———
@islemolecule_source
credit : @therealdreg
https://sonictk.github.io/asm_tutorial/
#windows_internls , #assembly ,
———
@islemolecule_source
👍2👌2
Event Log Tampering .
[ 1 ] Disrupting the EventLog Service
[ 2 ] Manipulating Individual Event Logs
[ 3 ] Combining Techniques
#red_team , #windows_internls
———
@islemolecule_source
[ 1 ] Disrupting the EventLog Service
[ 2 ] Manipulating Individual Event Logs
[ 3 ] Combining Techniques
#red_team , #windows_internls
———
@islemolecule_source
👍1
An Introduction to Bypassing User Mode EDR Hooks .
malwaretech.com/2023/12/an-i…
#EDR , #red_team #windows_internls
———
@islemolecule_source
malwaretech.com/2023/12/an-i…
#EDR , #red_team #windows_internls
———
@islemolecule_source
❤4
Windows Process Internals : A few Concepts to know before jumping on Memory Forensics
credit : Kirtar Oza
https://web.archive.org/web/20201117183039/https://eforensicsmag.com/windows-process-internals-a-few-concepts-to-know-before-jumping-on-memory-forensics-by-kirtar-oza/
#windows_internls . #memory_forensics
———
@islemolecule_source
credit : Kirtar Oza
https://web.archive.org/web/20201117183039/https://eforensicsmag.com/windows-process-internals-a-few-concepts-to-know-before-jumping-on-memory-forensics-by-kirtar-oza/
#windows_internls . #memory_forensics
———
@islemolecule_source
👍3