CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from Deadly malware xp
👍2
Forwarded from Deadly malware xp
🔥🔥🔥The GOAD’s writeups series end with this part.

💥GOAD - part 12 - Trusts
This post will be on escalation with domain trust (from child to parent domain) and on Forest to Forest trust lateral move.
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Hello, my rabbits who like to go to tea parties 🐰☕️

While I am writing about bitcoin nodes search and analysis, I decided to make a collection of rootkit malware on linux🐧


Reverse💊

Not really about linux, but still a very cool guide to reverse ;

Article about reverse-engineering the Ebpfkit rootkit ;

Article about dovecat and hy4 malware analysis for Linux ;

A collection of resources for reverse-engineering Linux ;

Article about virus analysis aromatization on linux ;

Article about malware analysis for Linux ;

Article about rootkit and its detection ;


Resources🗝

A site with material on viruses and rootkits on linux, including their writing ;

A site with resources on reversal ;

A resource site for people who want to write viruses for linux ;

A site with excellent material and documents about linux malware ;


Examples of malware 🦠

A github thread with cool virus repositories ;

Linux X86_64 ELF virus ;

A simple linux virus. It can get root rights and destroy your system ;

Linux ransomware ;

Repository of the source code of various Linux malware ;

Combination of shell and rootkit ;

Collection of Linux rootkits ;

A simple Linux kernel rootkit ;


MateriaLs / Collections📖

A collection of linux virus materials ;

A collection of materiałs on rootkits and attacks on linux ;

Article about evading malware analysis by reverse engineering ;

Malware analysis methodology in Linux environment ;

An article for understanding Linux malware ;

Not a bad article about writing rootkits on linux ;


Malware Scanners 🧲

LMD malware scanner for Linux ;

Linux rootkit scanner ;

A github thread with collections of Linux rootkit scanners ;

Also a good rootkit scanner ;


As you can see, although it is widely accepted that "writing viruses on linux is difficult, or even impossible practice", it is far from it, and that you have linux is not yet a silver bullet against viruses

On linux, viruses (especially rootkits) are written and very successfully
So take care and protect your system

Thank you for reading ❤️

And Alice, don't forget to read the sign on the back of the bottle you want to drink, in case it says "poison"🧪🎀
#malware #virus #revers #ransomware #attacks #linux #exploit #rootkit
»»»» https://webmail.cyber.net.pk:8443/login_up.php ««««

UserName: tac-user
Password: ~D4p5o8s
🍾4
💥Reverse Engineering Tiktok's VM Obfuscation (Part 1)

This article does not delve into the specifics of how these strings are utilized or how TikTok interprets the rest of the bytecode through its custom virtual machine and various opcodes. If that is something you are interested in, keep an eye out for the second part of this series.

🔖Full strings dump
Blindside.zip
22.9 KB
🔥🔥🔥Blindside is a technique for evading the monitoring of EDR and XDR platforms using hardware breakpoints to inject commands and perform unexpected, unwanted, or malicious operations. It involves creating a breakpoint handler, and setting a hardware breakpoint that will force the debugged process to load only ntdll to memory. This will result in a clean and unhooked ntdll which then could be copied to our process and unhook the original ntdll.

🔖Technical blog post:
Blindside: A New Technique for EDR Evasion with Hardware Breakpoints
🛡Fix memory leak in set_mempolicy_home_node system call

When encountering any vma in the range with policy other than MPOL_BIND or
MPOL_PREFERRED_MANY, an error is returned without issuing a mpol_put on
the policy just allocated with
mpol_dup().

⚠️This allows arbitrary users to leak kernel memory(Dos).
CVE-2022-42046.zip
32.3 KB
🔥🔥🔥PoC of wfshbr64.sys LPE(Windows Kernel Mode Anti-Cheat Driver, CVE-2022-42046)

wfshbr64.sys and wfshbr32.sys specially crafted payload allows arbitrary user to perform bitwise operation with arbitrary EPROCESS offset and flags value to purposely elevate the game process to CodeGen Full protection by manipulating EPROCESS.Protection and EPROCESS.SignatureLevel flags (security hole as a feature).

⚠️The driver is signed by Microsoft hardware compatibility publisher that is submitted via Microsoft Hardware Program.