🔥🔥🔥Survey of security mitigations and architectures, December 2022
"This blogpost summarizes and compares some of the exciting approaches in our journey to memory safety. I hope this could become a reference to interested readers and colleagues.
Along this blogpost I’ll consider five security properties: spatial safety, temporal safety, type safety, definite initialization and concurrency safety."
"This blogpost summarizes and compares some of the exciting approaches in our journey to memory safety. I hope this could become a reference to interested readers and colleagues.
Along this blogpost I’ll consider five security properties: spatial safety, temporal safety, type safety, definite initialization and concurrency safety."
Hacking tools pack & backdoors generator
https://github.com/AdrMXR/KitHack
Crack Interface lockscreen, Metasploit and More Android/IOS Hacking
https://github.com/tegal1337/CiLocks
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack
https://github.com/Leeon123/CC-attack
https://github.com/AdrMXR/KitHack
Crack Interface lockscreen, Metasploit and More Android/IOS Hacking
https://github.com/tegal1337/CiLocks
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack
https://github.com/Leeon123/CC-attack
GitHub
GitHub - AdrMXR/KitHack: Hacking tools pack & backdoors generator.
Hacking tools pack & backdoors generator. Contribute to AdrMXR/KitHack development by creating an account on GitHub.
Welcoming Our Forum »» https://system32.ink
ASK: Anything Related To Tech With Create your Own forum
Learn: About Programming,cybersecurity,bugHunting And Many More
Post: Share your Knowledge,Rats,Databases And Videos related to Tech
So SignUp Now And Grow Our Community
Thank You;
ASK: Anything Related To Tech With Create your Own forum
Learn: About Programming,cybersecurity,bugHunting And Many More
Post: Share your Knowledge,Rats,Databases And Videos related to Tech
So SignUp Now And Grow Our Community
Thank You;
Forwarded from 卩ro 爪Cracker
⚡3
PyBotNet
A #Python framework for building remote control, #botnet , #trojan or #backdoor with Telegram or other control panels
https://github.com/onionj/pybotnet
Documentation:
https://onionj.github.io/pybotnet/
A #Python framework for building remote control, #botnet , #trojan or #backdoor with Telegram or other control panels
https://github.com/onionj/pybotnet
Documentation:
https://onionj.github.io/pybotnet/
GitHub
GitHub - onionj/pybotnet: PyBotNet: A Remote Control Framework for Python with Telegram Integration
PyBotNet: A Remote Control Framework for Python with Telegram Integration - onionj/pybotnet
👍2
🔥🔥🔥Indirect syscalls PoCs:
💥HellsHall(combination of HellsGate and indirect syscalls) - Another Way To Fetch Clean Syscalls
🔖Github repo
💥C_SYSCALLS is a single stub direct and indirect syscalling with runtime SSN resolving for windows.
💥Hiding Your Syscalls - bypassing detections that I wrote myself. To the best of my knowledge EDR vendors aren’t really alerting on direct syscalls yet.
🔖Source code
💥FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++! Doesn't it bother you to have to define every syscall stub or function within a module? Or having to depend on the Windows version for the syscalls? Well, forget about all that. FreshyCalls makes use of some features implemented from C++11 such as the variadic templates along with some custom mini-shellcode to avoid this.
💥syscalls-asm
💥Charon's Ferry(adapted from HellsGate)- An indirect syscaller
💥HellsHall(combination of HellsGate and indirect syscalls) - Another Way To Fetch Clean Syscalls
🔖Github repo
💥C_SYSCALLS is a single stub direct and indirect syscalling with runtime SSN resolving for windows.
💥Hiding Your Syscalls - bypassing detections that I wrote myself. To the best of my knowledge EDR vendors aren’t really alerting on direct syscalls yet.
🔖Source code
💥FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++! Doesn't it bother you to have to define every syscall stub or function within a module? Or having to depend on the Windows version for the syscalls? Well, forget about all that. FreshyCalls makes use of some features implemented from C++11 such as the variadic templates along with some custom mini-shellcode to avoid this.
💥syscalls-asm
💥Charon's Ferry(adapted from HellsGate)- An indirect syscaller
👍2
⚡1
#Offensive_security
1. Offensive Software Exploitation (OSE) Course
https://github.com/ashemery/exploitation-course
2. Persistence and LOLBins
https://windowsir.blogspot.com/2022/12/persistence-and-lolbins.html
1. Offensive Software Exploitation (OSE) Course
https://github.com/ashemery/exploitation-course
2. Persistence and LOLBins
https://windowsir.blogspot.com/2022/12/persistence-and-lolbins.html
GitHub
GitHub - ashemery/exploitation-course: Offensive Software Exploitation Course
Offensive Software Exploitation Course. Contribute to ashemery/exploitation-course development by creating an account on GitHub.
#Threat_Research
1. Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022
https://pytorch.org/blog/compromised-nightly-dependency
2. Google Home Vulnerability: Eavesdropping on Conversations
https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html#poc-1-spy-on-victim
1. Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022
https://pytorch.org/blog/compromised-nightly-dependency
2. Google Home Vulnerability: Eavesdropping on Conversations
https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html#poc-1-spy-on-victim
#Malware_analysis
1. Dimorf - ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s
https://github.com/Ort0x36/Dimorf
2. TTPs: Rust vs C++
A comparative analysis of C++ and Rust implant binaries
https://steve-s.gitbook.io/0xtriboulet/ttps/ttps-rust-vs-c++
1. Dimorf - ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s
https://github.com/Ort0x36/Dimorf
2. TTPs: Rust vs C++
A comparative analysis of C++ and Rust implant binaries
https://steve-s.gitbook.io/0xtriboulet/ttps/ttps-rust-vs-c++
GitHub
GitHub - Ort0x36/Dimorf: Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s
Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s - Ort0x36/Dimorf