Forwarded from Security Analysis
⭕️ شرکت نرم افزاری چارگون که اتوماسیون اداری برای اکثر شرکتها و سازمانهای دولتی و دانشگاهی استفاده میشه هک شده و هشدار برای تمامی مشترکین ارسال شده.
پلیس فتا و مرکز ماهر و افتا و کلی بانک و ... جز لیست استفاده کنندگان این نرم افزار هستند.
@securation
پلیس فتا و مرکز ماهر و افتا و کلی بانک و ... جز لیست استفاده کنندگان این نرم افزار هستند.
@securation
Security Analysis
⭕️ شرکت نرم افزاری چارگون که اتوماسیون اداری برای اکثر شرکتها و سازمانهای دولتی و دانشگاهی استفاده میشه هک شده و هشدار برای تمامی مشترکین ارسال شده. پلیس فتا و مرکز ماهر و افتا و کلی بانک و ... جز لیست استفاده کنندگان این نرم افزار هستند. @securation
تبریک به تو
تبریک به من
تبریک به ما
تبریک به همه🥸
تبریک به من
تبریک به ما
تبریک به همه🥸
🎉1
Forwarded from Reverse Dungeon
MIT Operating System Engineering 6.1810(6.S081) Course
labs, pdfs, books, links, videos included
https://github.com/yaruwangway/6.S081
https://youtube.com/playlist?list=PLTsf9UeqkReZHXWY9yJvTwLJWYYPcKEqK&si=zt7GV6w5zFD-Vau4
CS 162 Berkley
https://youtube.com/playlist?list=PLF2K2xZjNEf97A_uBCwEl61sdxWVP7VWC&si=iQHM_2XyWPerIW4P
labs, pdfs, books, links, videos included
https://github.com/yaruwangway/6.S081
https://youtube.com/playlist?list=PLTsf9UeqkReZHXWY9yJvTwLJWYYPcKEqK&si=zt7GV6w5zFD-Vau4
CS 162 Berkley
https://youtube.com/playlist?list=PLF2K2xZjNEf97A_uBCwEl61sdxWVP7VWC&si=iQHM_2XyWPerIW4P
GitHub
GitHub - yaruwangway/6.S081: 🎶 MIT 6.S081 Operating System Engineering
🎶 MIT 6.S081 Operating System Engineering. Contribute to yaruwangway/6.S081 development by creating an account on GitHub.
🔥2
Forwarded from .....
We swear to point the finger of all Iranian organizations towards you.
You didn't understand, you shouldn't have entered the game with us and rejected our message, now you will experience a deep shiver with just one video.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from کورس کده
Windows Internals for RedTeaming
فارسی : #راوین
https://www.aparat.com/playlist/7606300
@it_free_course
فارسی : #راوین
https://www.aparat.com/playlist/7606300
@it_free_course
PE Structure
Creating PE parser
Creating a C2 server
Solving some of the HTB challenges
Buffer Overflow explaining
and more!
https://0xrick.github.io/
#binary
#reverse
#windows
Creating PE parser
Creating a C2 server
Solving some of the HTB challenges
Buffer Overflow explaining
and more!
https://0xrick.github.io/
#binary
#reverse
#windows
0xRick's Blog
0xRick’s Blog
Infosec blog.
Advanced C++ Programming Playlist:
> Virtual functions and polymorphism
> Mutex and multithreading
> Basics of network programming
https://youtube.com/playlist?list=PL9HfA4ZKbzimKyvquT1MZ2x9d6UHjFNFA&si=GpmJnh-zyN9M89FB
#course
#English
> Virtual functions and polymorphism
> Mutex and multithreading
> Basics of network programming
https://youtube.com/playlist?list=PL9HfA4ZKbzimKyvquT1MZ2x9d6UHjFNFA&si=GpmJnh-zyN9M89FB
#course
#English
❤🔥2
Windows powershell playlist (174 videos)
https://youtube.com/playlist?list=PLdfBRDjssB2Z0IXkb9-TYqHK1CkDg_xU1&si=_YzeYgcPe0VQG28B
#course
#English
#Windows
https://youtube.com/playlist?list=PLdfBRDjssB2Z0IXkb9-TYqHK1CkDg_xU1&si=_YzeYgcPe0VQG28B
#course
#English
#Windows
❤🔥2
🔥3
Forwarded from iDeFense
🔛 Python RAT for Windows that uses Telegram as C2 endpoint
(It's the serverless telegram version of Python-RAT)
💠 https://github.com/OgulcanUnveren/Python-Telegram-Rat
@iDeFense
(It's the serverless telegram version of Python-RAT)
💠 https://github.com/OgulcanUnveren/Python-Telegram-Rat
@iDeFense
Forwarded from Woland's Linux Journal (Woland)
💠Vim Bootstrap💠
در سایت vim bootstrap میتونین با انتخاب زبانهای مورد علاقه و تم، کانفیگ ویم یا نئوویم بسازید.
بعد از اون با زدن دکمه generate فایل کانفیگ رو دانلود کنید و در مسیر زیر قرار بدین:
Linux:
Windows:
فقط از نصب بودن curl و ویم اطمینان حاصل کنید، پلاگینها و تنظیمات با اولین ورود به ویم بهصورت خودکار نصب میشوند.
این کانفیگ قطعا بهترین کانفیگ ممکن نیست، چون بهترین کانفیگ اونیه که خودتون میسازید، اما برای شروع خوبه و به تدریج میتونین تغییرش بدین.
دو چیزی که اگه من باشم بلافاصله تغییر میدم:
یک تنظیمات درست برای تمها و دیدن طیف رنگی درست، و دوم تغییر مپینگهای حالت اینسرت.
راهنماش رو توی کامنت این پست میذارم.
#vim #ویم
در سایت vim bootstrap میتونین با انتخاب زبانهای مورد علاقه و تم، کانفیگ ویم یا نئوویم بسازید.
بعد از اون با زدن دکمه generate فایل کانفیگ رو دانلود کنید و در مسیر زیر قرار بدین:
Linux:
~/.vimrc Windows:
C:\Users\USERNAME\_vimrc فقط از نصب بودن curl و ویم اطمینان حاصل کنید، پلاگینها و تنظیمات با اولین ورود به ویم بهصورت خودکار نصب میشوند.
این کانفیگ قطعا بهترین کانفیگ ممکن نیست، چون بهترین کانفیگ اونیه که خودتون میسازید، اما برای شروع خوبه و به تدریج میتونین تغییرش بدین.
دو چیزی که اگه من باشم بلافاصله تغییر میدم:
یک تنظیمات درست برای تمها و دیدن طیف رنگی درست، و دوم تغییر مپینگهای حالت اینسرت.
راهنماش رو توی کامنت این پست میذارم.
#vim #ویم
🔥2
Forwarded from Source Chat
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Source Chat
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from $ᴘ3ᴅʏʟ1👾
some Resources for windows kernel programming:
Windows exploit development and windows kernel resources
00 - Windows Rootkits
01 - Windows kernel mitigations
02 - Windows kernel shellcode
03 - Windows kernel exploitation
04 -Windows kernel GDI exploitation
05 - Windows kernel Win32k.sys research
06 - Windows Kernel logic bugs
07 - Windows kernel driver development
08 - Windows internals
09 - Advanced Windows debugging
10 - 0days - APT advanced malware research
11 - Video game cheating (kernel mode stuff sometimes)
12 - Hyper-V and VM / sandbox escape
13 - Fuzzing
14 - Windows browser exploitation
15 - books, certifications and courses
and more :)
- Windows system programming Security
- Windows kernel programming fundamentals
- Windows exploitation
- Live 🔻 Modern Windows kernel exploitation
Article important for windows kernel programming and exploitation.
Windows Exploitation Links
https://github.com/r3p3r/nixawk-awesome-windows-exploitation
https://github.com/connormcgarr/Exploit-Development
https://github.com/connormcgarr/Kernel-Exploits
https://github.com/ElliotAlderson51/Exploit-Writeups
https://github.com/rhamaa/Binary-exploit-writeups#windows_stack_overflows
https://github.com/wtsxDev/Exploit-Development
https://www.corelan.be
https://malwareunicorn.org/#/workshops
https://p.ost2.fyi
https://www.securitytube.net
https://ctf101.org/binary-exploitation/overview
Windows Stack Protection I: Assembly Code
https://www.bowneconsultingcontent.com//pub/EH/proj/cloud/ED301c_tkp/ED301c_tkp.htm
Windows Stack Protection II: Exploit Without ASLR
https://www.bowneconsultingcontent.com//pub/EH/proj/cloud/ED302c_tkp/ED302c_tkp.htm
Windows Stack Protection III: Limitations of ASLR
https://www.bowneconsultingcontent.com//pub/EH/proj/cloud/ED303c_tkp/ED303c_tkp.htm
Exploit Development
Ch 6: The Wild World of Windows
https://samsclass.info/127/lec/EDch6.pdf
SEH-Based Stack Overflow Exploit
https://samsclass.info/127/proj/ED319.htm
Exploiting Easy RM to MP3 Converter on Windows with ASLR
https://samsclass.info/127/proj/ED318.htm
Bypassing Browser Memory Protections
https://www.blackhat.com/presentations/bh-usa-08/Sotirov_Dowd/bh08-sotirov-dowd.pdf
The Basics of Exploit Development 1: Win32 Buffer Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development
The Basics of Exploit Development 2: SEH Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-2-seh-overflows
The Basics of Exploit Development 3: Egg Hunters
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-3-egg-hunters
The Basics of Exploit Development 4: Unicode Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-4-unicode-overfl
The Basics of Exploit Development 5: x86-64 Buffer Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-5-x86-64-buffer
Resources for Exploit development:-
- roadmap for exploit development
- roadmap for exploit development 2
Resources....
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://crackmes.one
https://www.youtube.com/@pwncollege/videos
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
https://www.phrack.org/issues/49/14.html#article
https://github.com/justinsteven/dostackbufferoverflowgood
https://github.com/FabioBaroni/awesome-exploit-development
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
https://github.com/RPISEC/MBE
https://github.com/hoppersroppers/nightmare
https://github.com/shellphish/how2heap
https://www.youtube.com/watch?v=tMN5N5oid2c
https://dayzerosec.com/blog/2021/02/02/getting-started.html
https://github.com/Tzaoh/pwning
Windows exploit development and windows kernel resources
00 - Windows Rootkits
01 - Windows kernel mitigations
02 - Windows kernel shellcode
03 - Windows kernel exploitation
04 -Windows kernel GDI exploitation
05 - Windows kernel Win32k.sys research
06 - Windows Kernel logic bugs
07 - Windows kernel driver development
08 - Windows internals
09 - Advanced Windows debugging
10 - 0days - APT advanced malware research
11 - Video game cheating (kernel mode stuff sometimes)
12 - Hyper-V and VM / sandbox escape
13 - Fuzzing
14 - Windows browser exploitation
15 - books, certifications and courses
and more :)
- Windows system programming Security
- Windows kernel programming fundamentals
- Windows exploitation
- Live 🔻 Modern Windows kernel exploitation
Article important for windows kernel programming and exploitation.
Windows Exploitation Links
https://github.com/r3p3r/nixawk-awesome-windows-exploitation
https://github.com/connormcgarr/Exploit-Development
https://github.com/connormcgarr/Kernel-Exploits
https://github.com/ElliotAlderson51/Exploit-Writeups
https://github.com/rhamaa/Binary-exploit-writeups#windows_stack_overflows
https://github.com/wtsxDev/Exploit-Development
https://www.corelan.be
https://malwareunicorn.org/#/workshops
https://p.ost2.fyi
https://www.securitytube.net
https://ctf101.org/binary-exploitation/overview
Windows Stack Protection I: Assembly Code
https://www.bowneconsultingcontent.com//pub/EH/proj/cloud/ED301c_tkp/ED301c_tkp.htm
Windows Stack Protection II: Exploit Without ASLR
https://www.bowneconsultingcontent.com//pub/EH/proj/cloud/ED302c_tkp/ED302c_tkp.htm
Windows Stack Protection III: Limitations of ASLR
https://www.bowneconsultingcontent.com//pub/EH/proj/cloud/ED303c_tkp/ED303c_tkp.htm
Exploit Development
Ch 6: The Wild World of Windows
https://samsclass.info/127/lec/EDch6.pdf
SEH-Based Stack Overflow Exploit
https://samsclass.info/127/proj/ED319.htm
Exploiting Easy RM to MP3 Converter on Windows with ASLR
https://samsclass.info/127/proj/ED318.htm
Bypassing Browser Memory Protections
https://www.blackhat.com/presentations/bh-usa-08/Sotirov_Dowd/bh08-sotirov-dowd.pdf
The Basics of Exploit Development 1: Win32 Buffer Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development
The Basics of Exploit Development 2: SEH Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-2-seh-overflows
The Basics of Exploit Development 3: Egg Hunters
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-3-egg-hunters
The Basics of Exploit Development 4: Unicode Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-4-unicode-overfl
The Basics of Exploit Development 5: x86-64 Buffer Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-5-x86-64-buffer
Resources for Exploit development:-
- roadmap for exploit development
- roadmap for exploit development 2
Resources....
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://crackmes.one
https://www.youtube.com/@pwncollege/videos
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
https://www.phrack.org/issues/49/14.html#article
https://github.com/justinsteven/dostackbufferoverflowgood
https://github.com/FabioBaroni/awesome-exploit-development
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
https://github.com/RPISEC/MBE
https://github.com/hoppersroppers/nightmare
https://github.com/shellphish/how2heap
https://www.youtube.com/watch?v=tMN5N5oid2c
https://dayzerosec.com/blog/2021/02/02/getting-started.html
https://github.com/Tzaoh/pwning
GitHub
GitHub - FULLSHADE/WindowsExploitationResources: Resources for Windows exploit development
Resources for Windows exploit development. Contribute to FULLSHADE/WindowsExploitationResources development by creating an account on GitHub.
❤1
Forwarded from لیان - آموزش امنیت و تستنفوذ
https://liangroup.net/shop/product/android-penetration-test/
Please open Telegram to view this post
VIEW IN TELEGRAM