Forwarded from Deadly malware xp
🔥🔥🔥The GOAD’s writeups series end with this part.
💥GOAD - part 12 - Trusts
This post will be on escalation with domain trust (from child to parent domain) and on Forest to Forest trust lateral move.
💥GOAD - part 12 - Trusts
This post will be on escalation with domain trust (from child to parent domain) and on Forest to Forest trust lateral move.
Forwarded from Deadly malware xp
Hello, my rabbits who like to go to tea parties 🐰☕️
While I am writing about bitcoin nodes search and analysis, I decided to make a collection of rootkit malware on linux🐧
Reverse💊
Not really about linux, but still a very cool guide to reverse ;
Article about reverse-engineering the Ebpfkit rootkit ;
Article about dovecat and hy4 malware analysis for Linux ;
A collection of resources for reverse-engineering Linux ;
Article about virus analysis aromatization on linux ;
Article about malware analysis for Linux ;
Article about rootkit and its detection ;
Resources🗝
A site with material on viruses and rootkits on linux, including their writing ;
A site with resources on reversal ;
A resource site for people who want to write viruses for linux ;
A site with excellent material and documents about linux malware ;
Examples of malware 🦠
A github thread with cool virus repositories ;
Linux X86_64 ELF virus ;
A simple linux virus. It can get root rights and destroy your system ;
Linux ransomware ;
Repository of the source code of various Linux malware ;
Combination of shell and rootkit ;
Collection of Linux rootkits ;
A simple Linux kernel rootkit ;
MateriaLs / Collections📖
A collection of linux virus materials ;
A collection of materiałs on rootkits and attacks on linux ;
Article about evading malware analysis by reverse engineering ;
Malware analysis methodology in Linux environment ;
An article for understanding Linux malware ;
Not a bad article about writing rootkits on linux ;
Malware Scanners 🧲
LMD malware scanner for Linux ;
Linux rootkit scanner ;
A github thread with collections of Linux rootkit scanners ;
Also a good rootkit scanner ;
As you can see, although it is widely accepted that "writing viruses on linux is difficult, or even impossible practice", it is far from it, and that you have linux is not yet a silver bullet against viruses
On linux, viruses (especially rootkits) are written and very successfully
So take care and protect your system
Thank you for reading ❤️
And Alice, don't forget to read the sign on the back of the bottle you want to drink, in case it says "poison"🧪🎀
#malware #virus #revers #ransomware #attacks #linux #exploit #rootkit
While I am writing about bitcoin nodes search and analysis, I decided to make a collection of rootkit malware on linux🐧
Reverse💊
Not really about linux, but still a very cool guide to reverse ;
Article about reverse-engineering the Ebpfkit rootkit ;
Article about dovecat and hy4 malware analysis for Linux ;
A collection of resources for reverse-engineering Linux ;
Article about virus analysis aromatization on linux ;
Article about malware analysis for Linux ;
Article about rootkit and its detection ;
Resources🗝
A site with material on viruses and rootkits on linux, including their writing ;
A site with resources on reversal ;
A resource site for people who want to write viruses for linux ;
A site with excellent material and documents about linux malware ;
Examples of malware 🦠
A github thread with cool virus repositories ;
Linux X86_64 ELF virus ;
A simple linux virus. It can get root rights and destroy your system ;
Linux ransomware ;
Repository of the source code of various Linux malware ;
Combination of shell and rootkit ;
Collection of Linux rootkits ;
A simple Linux kernel rootkit ;
MateriaLs / Collections📖
A collection of linux virus materials ;
A collection of materiałs on rootkits and attacks on linux ;
Article about evading malware analysis by reverse engineering ;
Malware analysis methodology in Linux environment ;
An article for understanding Linux malware ;
Not a bad article about writing rootkits on linux ;
Malware Scanners 🧲
LMD malware scanner for Linux ;
Linux rootkit scanner ;
A github thread with collections of Linux rootkit scanners ;
Also a good rootkit scanner ;
As you can see, although it is widely accepted that "writing viruses on linux is difficult, or even impossible practice", it is far from it, and that you have linux is not yet a silver bullet against viruses
On linux, viruses (especially rootkits) are written and very successfully
So take care and protect your system
Thank you for reading ❤️
And Alice, don't forget to read the sign on the back of the bottle you want to drink, in case it says "poison"🧪🎀
#malware #virus #revers #ransomware #attacks #linux #exploit #rootkit
GitHub
GitHub - mytechnotalent/Reverse-Engineering: A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit…
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures. - mytechnotalent/Reverse-Engineering
🍾4
⚡3
💥Reverse Engineering Tiktok's VM Obfuscation (Part 1)
This article does not delve into the specifics of how these strings are utilized or how TikTok interprets the rest of the bytecode through its custom virtual machine and various opcodes. If that is something you are interested in, keep an eye out for the second part of this series.
🔖Full strings dump
This article does not delve into the specifics of how these strings are utilized or how TikTok interprets the rest of the bytecode through its custom virtual machine and various opcodes. If that is something you are interested in, keep an eye out for the second part of this series.
🔖Full strings dump
Blindside.zip
22.9 KB
🔥🔥🔥Blindside is a technique for evading the monitoring of EDR and XDR platforms using hardware breakpoints to inject commands and perform unexpected, unwanted, or malicious operations. It involves creating a breakpoint handler, and setting a hardware breakpoint that will force the debugged process to load only ntdll to memory. This will result in a clean and unhooked ntdll which then could be copied to our process and unhook the original ntdll.
🔖Technical blog post:
Blindside: A New Technique for EDR Evasion with Hardware Breakpoints
🔖Technical blog post:
Blindside: A New Technique for EDR Evasion with Hardware Breakpoints
🛡Fix memory leak in set_mempolicy_home_node system call
When encountering any vma in the range with policy other than MPOL_BIND or
MPOL_PREFERRED_MANY, an error is returned without issuing a mpol_put on
the policy just allocated with mpol_dup().
⚠️This allows arbitrary users to leak kernel memory(Dos).
When encountering any vma in the range with policy other than MPOL_BIND or
MPOL_PREFERRED_MANY, an error is returned without issuing a mpol_put on
the policy just allocated with mpol_dup().
⚠️This allows arbitrary users to leak kernel memory(Dos).