CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
🔥🔥🔥Indirect syscalls PoCs:

💥HellsHall(combination of HellsGate and indirect syscalls) - Another Way To Fetch Clean Syscalls
🔖Github repo

💥C_SYSCALLS is a single stub direct and indirect syscalling with runtime SSN resolving for windows.

💥Hiding Your Syscalls - bypassing detections that I wrote myself. To the best of my knowledge EDR vendors aren’t really alerting on direct syscalls yet.
🔖Source code

💥FreshyCalls tries to make the use of syscalls comfortable and simple, without generating too much boilerplate and in modern C++! Doesn't it bother you to have to define every syscall stub or function within a module? Or having to depend on the Windows version for the syscalls? Well, forget about all that. FreshyCalls makes use of some features implemented from C++11 such as the variadic templates along with some custom mini-shellcode to avoid this.

💥syscalls-asm

💥Charon's Ferry(adapted from HellsGate)- An indirect syscaller
👍2
#Threat_Research
1. Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022
https://pytorch.org/blog/compromised-nightly-dependency
2. Google Home Vulnerability: Eavesdropping on Conversations
https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html#poc-1-spy-on-victim
EarSpy.pdf
3.7 MB
#Research
"EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers", 2022.