ByteShield
@BinaryWorldd
1.28K
subscribers
99
photos
32
videos
107
files
519
links
Download Telegram
Join
ByteShield
1.28K subscribers
ByteShield
https://github.com/H4CK3RT3CH/RedTeaming_CheatSheet
GitHub
GitHub - H4CK3RT3CH/RedTeaming_CheatSheet
Contribute to H4CK3RT3CH/RedTeaming_CheatSheet development by creating an account on GitHub.
ByteShield
https://vladtoie.gitbook.io/secure-coding/
vladtoie.gitbook.io
Secure Coding Handbook
ByteShield
https://www.wiz.io/blog/linux-rootkits-explained-part-1-dynamic-linker-hijacking
By
@AbbyMCH
wiz.io
Linux rootkits explained – Part 1: Dynamic linker hijacking | Wiz Blog
Dynamic linker hijacking via LD_PRELOAD is a Linux rootkit technique utilized by different threat actors in the wild. In part one of this series on Linux rootkits, we discuss this threat and explain how to detect it.
ByteShield
https://learntohack.hac10101.com/
Hacker theme
Home
Hacker is a theme for GitHub Pages.
ByteShield
https://heap-exploitation.dhavalkapil.com/
Dhavalkapil
Preface | heap-exploitation
ByteShield
https://github.com/Ahmed-AL-Maghraby/Windows-Registry-Analysis-Cheat-Sheet
GitHub
GitHub - Ahmed-AL-Maghraby/Windows-Registry-Analysis-Cheat-Sheet
Contribute to Ahmed-AL-Maghraby/Windows-Registry-Analysis-Cheat-Sheet development by creating an account on GitHub.
ByteShield
https://github.com/snowcra5h/Faronics-DeepFreeze-8-Exploit
ByteShield
https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-2
BITSADMIN Blog
Living Off the Foreign Land - Part 2/3: Configuring the Offensive Windows VM
Living Off the Foreign Land (LOFL) allows attackers to use Windows' built-in powerful tooling (LOFLCABs) to attack remote systems. The second part in this 3-part article discusses how to configure the Offensive Windows VM so it can use Kerberos authentication…
ByteShield
https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform-part-3
BITSADMIN Blog
Living Off the Foreign Land - Part 3/3: Using Windows as Offensive Platform
Living Off the Foreign Land (LOFL) allows attackers to use Windows' built-in powerful tooling (LOFLCABs) to attack remote systems. The last part in this 3-part article discusses the various LOFL Cmdlets and Binaries (CABs) that can be used to attack systems…
ByteShield
https://blog.bitsadmin.com/living-off-the-foreign-land-windows-as-offensive-platform
BITSADMIN Blog
Living Off the Foreign Land - Part 1/3: Setup Linux VM for SOCKS routing
Living Off the Foreign Land (LOFL) allows attackers to use Windows' built-in powerful tooling (LOFLCABs) to attack remote systems. The first part in this 3-part article discusses how to setup the Linux VM to transparently tunnel traffic over SOCKS. This enables…
ByteShield
https://github.com/b1tg/CVE-2023-38831-winrar-exploit
GitHub
GitHub - b1tg/CVE-2023-38831-winrar-exploit: CVE-2023-38831 winrar exploit generator
CVE-2023-38831 winrar exploit generator. Contribute to b1tg/CVE-2023-38831-winrar-exploit development by creating an account on GitHub.
👍
1
ByteShield
https://web.archive.org/web/20230403234851/https://pre.empt.dev/posts/maelstrom-the-implant/
web.archive.org
pre.empt.dev: Writing a C2 Implant
In this blog, we will discuss how to write a C2 implant for the modern era. We will look at the history of offensive techniques and the progress of defence. We then move into discussing some key concepts before finally writing stage 0, and the implant as…
ByteShield
https://web.archive.org/web/20210413102213/http://security.cs.rpi.edu/courses/hwre-spring2014/
CSCI 4974 / 6974 Hardware Reverse Engineering
ByteShield
https://github.com/RPISEC/MBE#modern-binary-exploitation---csci-4968
GitHub
GitHub - RPISEC/MBE: Course materials for Modern Binary Exploitation by RPISEC
Course materials for Modern Binary Exploitation by RPISEC - RPISEC/MBE
ByteShield
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
GitHub
GitHub - CyberSecurityUP/Awesome-Exploit-Development
Contribute to CyberSecurityUP/Awesome-Exploit-Development development by creating an account on GitHub.
ByteShield
https://medium.com/@moon_osint/how-to-find-the-administrator-of-an-onion-site-89d176b0061a
Medium
How to find the administrator of an onion site?
In this article, I will talk about how administrators of resources in the Tor Network, i.e. the Darkweb, are identified.
ByteShield
https://whiterose-infosec.super.site/mjsxj09cm-recovering-firmware-and-backdooring
MJSXJ09CM - Recovering Firmware and Backdooring
I decided to disassemble the device and take a closer look at the hardware.
ByteShield
https://labs.withsecure.com/publications/executing-arbitrary-code-executables-in-read-only-filesystems
Withsecure
Executing Arbitrary Code & Executables in Read-Only FileSystems
In containerized environments, such as Kubernetes clusters, read-only filesystems are viewed as an additional layer of defense, as they allow for better control and management of containerized applications. Immutable containers are consistent and predictable…
ByteShield
https://github.com/nickvourd/Supernova
GitHub
GitHub - nickvourd/Supernova: Real fucking shellcode encryptor & obfuscator tool
Real fucking shellcode encryptor & obfuscator tool - nickvourd/Supernova
ByteShield
For windows problems, reboot
For Linux problems, be root :)
💯
4
ByteShield
Vetr shelter
<unknown>