#Red_Team_Tactics
1. Writing Windows Kernel Drivers for Advanced Persistence
https://v3ded.github.io/redteam/red-team-tactics-writing-windows-kernel-drivers-for-advanced-persistence-part-1
2. 0 click Facebook Account Takeover and Two-Factor Authentication Bypass
https://medium.com/@yaala/account-takeover-and-two-factor-authentication-bypass-de56ed41d7f9
1. Writing Windows Kernel Drivers for Advanced Persistence
https://v3ded.github.io/redteam/red-team-tactics-writing-windows-kernel-drivers-for-advanced-persistence-part-1
2. 0 click Facebook Account Takeover and Two-Factor Authentication Bypass
https://medium.com/@yaala/account-takeover-and-two-factor-authentication-bypass-de56ed41d7f9
v3ded.github.io
Red Team Tactics: Writing Windows Kernel Drivers for Advanced Persistence (Part 1)
Introduction This post, as indicated by the title, will cover the topic of writing Windows kernel drivers for advanced persistence. Because the subject matte...
Thank you very much for reading me ❤️
Here is an article about reverse firmware in English:
https://telegra.ph/Introduction-to-Firmware-Reversal-12-30
Here is an article about reverse firmware in English:
https://telegra.ph/Introduction-to-Firmware-Reversal-12-30
Telegraph
Introduction to Firmware Reversal
Good afternoon my white rabbits, Merry Christmas to all of yo !🐰🎄 I wanted to do a small series of posts about reverse firmware .
🔥🔥🔥Survey of security mitigations and architectures, December 2022
"This blogpost summarizes and compares some of the exciting approaches in our journey to memory safety. I hope this could become a reference to interested readers and colleagues.
Along this blogpost I’ll consider five security properties: spatial safety, temporal safety, type safety, definite initialization and concurrency safety."
"This blogpost summarizes and compares some of the exciting approaches in our journey to memory safety. I hope this could become a reference to interested readers and colleagues.
Along this blogpost I’ll consider five security properties: spatial safety, temporal safety, type safety, definite initialization and concurrency safety."
Hacking tools pack & backdoors generator
https://github.com/AdrMXR/KitHack
Crack Interface lockscreen, Metasploit and More Android/IOS Hacking
https://github.com/tegal1337/CiLocks
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack
https://github.com/Leeon123/CC-attack
https://github.com/AdrMXR/KitHack
Crack Interface lockscreen, Metasploit and More Android/IOS Hacking
https://github.com/tegal1337/CiLocks
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack
https://github.com/Leeon123/CC-attack
GitHub
GitHub - AdrMXR/KitHack: Hacking tools pack & backdoors generator.
Hacking tools pack & backdoors generator. Contribute to AdrMXR/KitHack development by creating an account on GitHub.
Welcoming Our Forum »» https://system32.ink
ASK: Anything Related To Tech With Create your Own forum
Learn: About Programming,cybersecurity,bugHunting And Many More
Post: Share your Knowledge,Rats,Databases And Videos related to Tech
So SignUp Now And Grow Our Community
Thank You;
ASK: Anything Related To Tech With Create your Own forum
Learn: About Programming,cybersecurity,bugHunting And Many More
Post: Share your Knowledge,Rats,Databases And Videos related to Tech
So SignUp Now And Grow Our Community
Thank You;
Forwarded from 卩ro 爪Cracker
⚡3
PyBotNet
A #Python framework for building remote control, #botnet , #trojan or #backdoor with Telegram or other control panels
https://github.com/onionj/pybotnet
Documentation:
https://onionj.github.io/pybotnet/
A #Python framework for building remote control, #botnet , #trojan or #backdoor with Telegram or other control panels
https://github.com/onionj/pybotnet
Documentation:
https://onionj.github.io/pybotnet/
GitHub
GitHub - onionj/pybotnet: PyBotNet: A Remote Control Framework for Python with Telegram Integration
PyBotNet: A Remote Control Framework for Python with Telegram Integration - onionj/pybotnet
👍2
🔥🔥🔥Indirect syscalls PoCs:
💥HellsHall(combination of HellsGate and indirect syscalls) - Another Way To Fetch Clean Syscalls
🔖Github repo
💥C_SYSCALLS is a single stub direct and indirect syscalling with runtime SSN resolving for windows.
💥Hiding Your Syscalls - bypassing detections that I wrote myself. To the best of my knowledge EDR vendors aren’t really alerting on direct syscalls yet.
🔖Source code
💥FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++! Doesn't it bother you to have to define every syscall stub or function within a module? Or having to depend on the Windows version for the syscalls? Well, forget about all that. FreshyCalls makes use of some features implemented from C++11 such as the variadic templates along with some custom mini-shellcode to avoid this.
💥syscalls-asm
💥Charon's Ferry(adapted from HellsGate)- An indirect syscaller
💥HellsHall(combination of HellsGate and indirect syscalls) - Another Way To Fetch Clean Syscalls
🔖Github repo
💥C_SYSCALLS is a single stub direct and indirect syscalling with runtime SSN resolving for windows.
💥Hiding Your Syscalls - bypassing detections that I wrote myself. To the best of my knowledge EDR vendors aren’t really alerting on direct syscalls yet.
🔖Source code
💥FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++! Doesn't it bother you to have to define every syscall stub or function within a module? Or having to depend on the Windows version for the syscalls? Well, forget about all that. FreshyCalls makes use of some features implemented from C++11 such as the variadic templates along with some custom mini-shellcode to avoid this.
💥syscalls-asm
💥Charon's Ferry(adapted from HellsGate)- An indirect syscaller
👍2
⚡1
#Offensive_security
1. Offensive Software Exploitation (OSE) Course
https://github.com/ashemery/exploitation-course
2. Persistence and LOLBins
https://windowsir.blogspot.com/2022/12/persistence-and-lolbins.html
1. Offensive Software Exploitation (OSE) Course
https://github.com/ashemery/exploitation-course
2. Persistence and LOLBins
https://windowsir.blogspot.com/2022/12/persistence-and-lolbins.html
GitHub
GitHub - ashemery/exploitation-course: Offensive Software Exploitation Course
Offensive Software Exploitation Course. Contribute to ashemery/exploitation-course development by creating an account on GitHub.