Asia_24_Yair_magicdot_a_hackers_magic_show_of_disappearing_dots.pdf
3.8 MB
Asia-24-Yair-magicdot-a-hackers-magic-show-of-disappearing-dots-and-spaces.pdf
👍3
Forwarded from Soxoj insides
Top SOCMINT tools to investigate and to deanonymize GitHub accounts:
- GitFive from mxrch
- Octosuite from rly0heart (Bellingcat)
- Gitcolombo from soxoj
- Zen from s0md3v
- Map of GitHub from anvaka
- Dorks and secret search for cybersec
👉 Read more: https://sowel.soxoj.com/check-commits
#github #community
- GitFive from mxrch
- Octosuite from rly0heart (Bellingcat)
- Gitcolombo from soxoj
- Zen from s0md3v
- Map of GitHub from anvaka
- Dorks and secret search for cybersec
👉 Read more: https://sowel.soxoj.com/check-commits
#github #community
❤5
Trace processing pipeline
https://github.com/SeanHeelan/otel-profiling-agent/blob/main/README.md#trace-processing-pipeline
https://github.com/SeanHeelan/otel-profiling-agent/blob/main/README.md#trace-processing-pipeline
👍7
Forwarded from CyberSecurityTechnologies (-CST-)
#exploit
1. Windows 11 24H2 NT Exploit
https://github.com/exploits-forsale/24h2-nt-exploit
2. CVE-2024-29417:
Unauth privilege escalation in Horacius
https://blog.pridesec.com.br/en/horacius-unauthenticated-privilege-escalation
1. Windows 11 24H2 NT Exploit
https://github.com/exploits-forsale/24h2-nt-exploit
2. CVE-2024-29417:
Unauth privilege escalation in Horacius
https://blog.pridesec.com.br/en/horacius-unauthenticated-privilege-escalation
👍3 2
System Programming Roadmap
https://github.com/ujjwal-kr/system-programming-roadmap
System Programming Languages
Computer Architecture
Assembly
Compilers
Exploitation
Browser Hacking
Malware
OS Fundamentals
VM internals
https://github.com/ujjwal-kr/system-programming-roadmap
🔥7👍1
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
https://github.com/crocodyli/ThreatActors-TTPs.git
https://github.com/crocodyli/ThreatActors-TTPs.git
🔥4👍1 1
RIFT: Analysing a Lazarus Shellcode Execution Method NCC Group Research
Shellcode Execution via EnumSystemLocalA
https://blog.securehat.co.uk/process-injection/shellcode-execution-via-enumsystemlocala
[ Ref ]
This post covers a shellcode execution technique that leverages the UuidFromStringA and EnumSystemLocalA APIs to load and execute shellcode
Shellcode Execution via EnumSystemLocalA
https://blog.securehat.co.uk/process-injection/shellcode-execution-via-enumsystemlocala
[ Ref ]
🔥4 1
🔥4👍1 1
Zloader has reintroduced an anti-analysis feature similar to one that was present in the original ZeuS 2.x code. The feature restricts Zloader’s binary execution to the infected machine.
[ zscaler ]
[+] Technical analysis
#malware_analysis
[ zscaler ]
[+] Technical analysis
#malware_analysis
Source Byte
BlackHat - Android UserLand Fuzzing and Exploitation Full Course https://t.iss.one/boost/Source_byte
Thanks for your boosts❤️
❤6 2👍1
Source Byte
Part 7 is up! Continuing with PE parsing we'll also explore easy ways to parse attributes and the various flags that Windows uses specific to PE files Register here: https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-7/?utm_medium=Social&utm…
An Intro to C for Windows - Part 8
https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-8/
credit : Jonathan Reiter
Threads, stacks, and heaps! Part 8 will take a look at using Windows APIs to create threads, heaps, and using a debugger to view stacks. We will also talk about some of the myths around stack growth versus stack usage.
https://www.sans.org/webcasts/an-intro-to-c-for-windows-part-8/
credit : Jonathan Reiter