Stuff for Geeks
158 subscribers
181 photos
38 videos
178 files
575 links
Admin: @the_mhbr
Download Telegram
Forwarded from Security Analysis
⭕️ شرکت نرم افزاری چارگون که اتوماسیون اداری برای اکثر شرکتها و سازمانهای دولتی و دانشگاهی استفاده میشه هک شده و هشدار برای تمامی مشترکین ارسال شده.
پلیس فتا و مرکز ماهر و افتا و کلی بانک و ‌‌... جز لیست استفاده کنندگان این نرم افزار هستند.

@securation
Forwarded from .....
🔥Chargσσn speaks with full confidence about his safety, now we have prepared a gift for him
We swear to point the finger of all Iranian organizations towards you.
You didn't understand, you shouldn't have entered the game with us and rejected our message, now you will experience a deep shiver with just one video.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from کورس کده
Windows Internals for RedTeaming

فارسی : #راوین
https://www.aparat.com/playlist/7606300

@it_free_course
PE Structure
Creating PE parser
Creating a C2 server
Solving some of the HTB challenges
Buffer Overflow explaining
and more!

https://0xrick.github.io/

#binary
#reverse
#windows
Advanced C++ Programming Playlist:

> Virtual functions and polymorphism

> Mutex and multithreading

> Basics of network programming

https://youtube.com/playlist?list=PL9HfA4ZKbzimKyvquT1MZ2x9d6UHjFNFA&si=GpmJnh-zyN9M89FB


#course
#English
❤‍🔥2
Google recaptcha solver😱

https://github.com/notune/captcha-solver
🔥3
Forwarded from iDeFense
🔛 Python RAT for Windows that uses Telegram as C2 endpoint
(It's the serverless telegram version of Python-RAT)

💠 https://github.com/OgulcanUnveren/Python-Telegram-Rat

@iDeFense
Forwarded from Woland's Linux Journal (Woland)
💠Vim Bootstrap💠

در سایت vim bootstrap می‌تونین با انتخاب زبان‌های مورد علاقه و تم، کانفیگ ویم یا نئوویم بسازید.
بعد از اون با زدن دکمه ‌generate فایل کانفیگ رو دانلود کنید و در مسیر زیر قرار بدین:
Linux: ~/.vimrc
Windows: C:\Users\USERNAME\_vimrc

فقط از نصب بودن curl و ویم اطمینان حاصل کنید، پلاگین‌ها و تنظیمات با اولین ورود به ویم به‌صورت خودکار نصب می‌شوند.

این کانفیگ قطعا بهترین کانفیگ ممکن نیست، چون بهترین کانفیگ اونیه که خودتون می‌سازید، اما برای شروع خوبه و به تدریج می‌تونین تغییرش بدین.

دو چیزی که اگه من باشم بلافاصله تغییر می‌دم:

یک تنظیمات درست برای تم‌ها و دیدن طیف رنگی درست، و دوم تغییر مپینگ‌های حالت اینسرت.
راهنماش رو توی کامنت این پست می‌ذارم.

#vim #ویم
🔥2
Forwarded from Source Chat
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Source Chat
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌$ᴘ3ᴅʏʟ1👾
some Resources for windows kernel programming:

Windows exploit development and windows kernel resources
00 - Windows Rootkits
01 - Windows kernel mitigations
02 - Windows kernel shellcode
03 - Windows kernel exploitation
04 -Windows kernel GDI exploitation
05 - Windows kernel Win32k.sys research
06 - Windows Kernel logic bugs
07 - Windows kernel driver development
08 - Windows internals
09 - Advanced Windows debugging
10 - 0days - APT advanced malware research
11 - Video game cheating (kernel mode stuff sometimes)
12 - Hyper-V and VM / sandbox escape
13 - Fuzzing
14 - Windows browser exploitation
15 - books, certifications and courses
and more :)

- Windows system programming Security

- Windows kernel programming fundamentals

- Windows exploitation

- Live 🔻 Modern Windows kernel exploitation

Article important for windows kernel programming and exploitation.

Windows Exploitation Links


https://github.com/r3p3r/nixawk-awesome-windows-exploitation

https://github.com/connormcgarr/Exploit-Development

https://github.com/connormcgarr/Kernel-Exploits

https://github.com/ElliotAlderson51/Exploit-Writeups

https://github.com/rhamaa/Binary-exploit-writeups#windows_stack_overflows

https://github.com/wtsxDev/Exploit-Development

https://www.corelan.be

https://malwareunicorn.org/#/workshops

https://p.ost2.fyi

https://www.securitytube.net

https://ctf101.org/binary-exploitation/overview

Windows Stack Protection I: Assembly Code
https://www.bowneconsultingcontent.com//pub/EH/proj/cloud/ED301c_tkp/ED301c_tkp.htm

Windows Stack Protection II: Exploit Without ASLR
https://www.bowneconsultingcontent.com//pub/EH/proj/cloud/ED302c_tkp/ED302c_tkp.htm

Windows Stack Protection III: Limitations of ASLR
https://www.bowneconsultingcontent.com//pub/EH/proj/cloud/ED303c_tkp/ED303c_tkp.htm

Exploit Development
Ch 6: The Wild World of Windows
https://samsclass.info/127/lec/EDch6.pdf

SEH-Based Stack Overflow Exploit
https://samsclass.info/127/proj/ED319.htm

Exploiting Easy RM to MP3 Converter on Windows with ASLR
https://samsclass.info/127/proj/ED318.htm

Bypassing Browser Memory Protections
https://www.blackhat.com/presentations/bh-usa-08/Sotirov_Dowd/bh08-sotirov-dowd.pdf

The Basics of Exploit Development 1: Win32 Buffer Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development

The Basics of Exploit Development 2: SEH Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-2-seh-overflows

The Basics of Exploit Development 3: Egg Hunters
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-3-egg-hunters

The Basics of Exploit Development 4: Unicode Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-4-unicode-overfl

The Basics of Exploit Development 5: x86-64 Buffer Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-5-x86-64-buffer

Resources for Exploit development:-

- roadmap for exploit development
- roadmap for exploit development 2

Resources....

https://github.com/0xZ0F/Z0FCourse_ReverseEngineering

https://crackmes.one

https://www.youtube.com/@pwncollege/videos

https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf

https://www.phrack.org/issues/49/14.html#article

https://github.com/justinsteven/dostackbufferoverflowgood

https://github.com/FabioBaroni/awesome-exploit-development

https://github.com/CyberSecurityUP/Awesome-Exploit-Development

https://github.com/RPISEC/MBE

https://github.com/hoppersroppers/nightmare

https://github.com/shellphish/how2heap

https://www.youtube.com/watch?v=tMN5N5oid2c

https://dayzerosec.com/blog/2021/02/02/getting-started.html

https://github.com/Tzaoh/pwning
1
☄️ به مناسبت روز جهانی زن، به مدت 24 ساعت دوره تست نفوذ اندروید با تدریس مهندس زنجانی، به انتخاب شما رایگان شد.

👈 لینک دریافت دوره:
https://liangroup.net/shop/product/android-penetration-test/

💻 گروه لیان
🔗 https://liangroup.net/
🕊 @AcademyLian
Please open Telegram to view this post
VIEW IN TELEGRAM