Forwarded from 𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠
Forwarded from 𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠
👍1
📌Добрый вечер, КиберАрмия⚔🇷🇺
Пробуем положить усраинский свиносервис для поиска работы, призывающий создавать Call-центры для обзвонов Российских государственных учреждений в целях сообщения ложной информации об их минировании!
URL: http://trudbox.com.ua/
IP: 85.17.141.222❓
IP: 88.85.94.39❓
Начинаем⚠️
Пробуем положить усраинский свиносервис для поиска работы, призывающий создавать Call-центры для обзвонов Российских государственных учреждений в целях сообщения ложной информации об их минировании!
URL: http://trudbox.com.ua/
IP: 85.17.141.222❓
IP: 88.85.94.39❓
Начинаем⚠️
Мы шикарны👄
Неплохо поработали💯
А свиньи как всегда идут
⚰🏃♂️🏃♂️🏃♂️🏃♂️🏃♂️🏃♂️👍
Неплохо поработали💯
А свиньи как всегда идут
⚰🏃♂️🏃♂️🏃♂️🏃♂️🏃♂️🏃♂️👍
Forwarded from Cyber security intelligent program
𝘾𝙍𝙔𝙋𝙏𝙊 𝙊𝙎𝙄𝙉𝙏:
├BTC-ETH-XRP-BCH-LTC-XLM-DASH-ZEC-XMR-TON (Blockchain)
├Google Dorks (Change Wallet)
├blockchair (Explorer) + Chrome
├breadcrumbs (Visualization) + Chrome
├shard (Visualization)
├blockpath (Visualization)
├oxt (Visualization)
├graphsense (Visualization)
├ethtective (Visualization ETH)
├walletexplorer (Grouping)
├bitinfocharts (Grouping)
├bitcoinabuse (Abuse)
├bitcoinwhoswho (Abuse)
├checkbitcoinaddress (Abuse)
├scamalert (Abuse)
├cryptscam (Abuse)
├ransomwhe (Abuse)
├badbitcoin (Abuse)
├bitcoinais (Abuse)
├cryptoblacklist (Abuse)
├bitrankverified (Scoring)
├vivigle (Scoring)
├antinalysis (Scoring TOR)
├cryptocurrencyalerting (Monitoring)
├cryptotxalert (Monitoring)
├kycp (Block Analysis)
├blockstream (Block Analysis)
├fragment (TON market)
└btcrecover (Wallet Brute)
├BTC-ETH-XRP-BCH-LTC-XLM-DASH-ZEC-XMR-TON (Blockchain)
├Google Dorks (Change Wallet)
├blockchair (Explorer) + Chrome
├breadcrumbs (Visualization) + Chrome
├shard (Visualization)
├blockpath (Visualization)
├oxt (Visualization)
├graphsense (Visualization)
├ethtective (Visualization ETH)
├walletexplorer (Grouping)
├bitinfocharts (Grouping)
├bitcoinabuse (Abuse)
├bitcoinwhoswho (Abuse)
├checkbitcoinaddress (Abuse)
├scamalert (Abuse)
├cryptscam (Abuse)
├ransomwhe (Abuse)
├badbitcoin (Abuse)
├bitcoinais (Abuse)
├cryptoblacklist (Abuse)
├bitrankverified (Scoring)
├vivigle (Scoring)
├antinalysis (Scoring TOR)
├cryptocurrencyalerting (Monitoring)
├cryptotxalert (Monitoring)
├kycp (Block Analysis)
├blockstream (Block Analysis)
├fragment (TON market)
└btcrecover (Wallet Brute)
Blockchain
Invest like an icon | Blockchain
We power crypto access for everyone: from private people, to pros, to public companies. Here since the beginning of crypto.
Forwarded from Deadly malware xp
#Red_Team_Tactics
1. Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime
https://github.com/D1rkMtr/UnhookingPatch
2. A new AMSI Bypass technique using .NET ALI Call Hooking
https://github.com/pracsec/AmsiBypassHookManagedAPI
3. Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID
https://github.com/D1rkMtr/FilelessNtdllReflection
1. Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime
https://github.com/D1rkMtr/UnhookingPatch
2. A new AMSI Bypass technique using .NET ALI Call Hooking
https://github.com/pracsec/AmsiBypassHookManagedAPI
3. Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID
https://github.com/D1rkMtr/FilelessNtdllReflection
❤1
Forwarded from Deadly malware xp
#tools
#Offensive_security
Ronin - Open Source Ruby toolkit for security research and development
https://github.com/ronin-rb/ronin
#Offensive_security
Ronin - Open Source Ruby toolkit for security research and development
https://github.com/ronin-rb/ronin
GitHub
GitHub - ronin-rb/ronin: Ronin is a Free and Open Source Ruby Toolkit for Security Research and Development. Ronin also allows…
Ronin is a Free and Open Source Ruby Toolkit for Security Research and Development. Ronin also allows for the rapid development and distribution of code, exploits, payloads, etc, via 3rd-party git ...
👍1
Forwarded from Deadly malware xp
#Blue_Team_Techniques
1. Recognizing the APT groups most likely responsible for a cybersecurity incident from the MITRE ATT&CK techniques in the incident report of the incident
https://gitlab.com/bontchev/whodunit
2. Open source tool to aid in SOC investigations
https://github.com/zdhenard42/SOC-Multitool
1. Recognizing the APT groups most likely responsible for a cybersecurity incident from the MITRE ATT&CK techniques in the incident report of the incident
https://gitlab.com/bontchev/whodunit
2. Open source tool to aid in SOC investigations
https://github.com/zdhenard42/SOC-Multitool
GitLab
Vesselin Bontchev / whodunit · GitLab
Recognizing the most likely APT groups responsible for an incident
Forwarded from Deadly malware xp
IPv6_security.pdf
14.3 MB
#Whitepaper
"IPv6 Security Guide", 2022.
"IPv6 Security Guide", 2022.
👍1
Forwarded from Deadly malware xp
#Malware_analysis
Unraveling the techniques of Mac ransomware
https://www.microsoft.com/en-us/security/blog/2023/01/05/unraveling-the-techniques-of-mac-ransomware
Unraveling the techniques of Mac ransomware
https://www.microsoft.com/en-us/security/blog/2023/01/05/unraveling-the-techniques-of-mac-ransomware
👍1
Forwarded from Deadly malware xp
#exploit
PandoraFMS NG765 - Pre-Auth RCE
https://3sjay.github.io/2023/01/06/pandoraFMS-Pre-Auth-RCE.html
PandoraFMS NG765 - Pre-Auth RCE
https://3sjay.github.io/2023/01/06/pandoraFMS-Pre-Auth-RCE.html
Esjay’s Blog
PandoraFMS - Pre-Auth Remote Code Execution
Assessed Version: PandoraFMS NG 765
Forwarded from Deadly malware xp
#Red_Team_Tactics
How To Attack Admin Panels Successfully
Part 1: https://infosecwriteups.com/how-to-attack-admin-panels-successfully-72c90eeb818c
Part 2: https://medium.com/geekculture/how-to-attack-admin-panels-successfully-part-2-9316c3caad3a
How To Attack Admin Panels Successfully
Part 1: https://infosecwriteups.com/how-to-attack-admin-panels-successfully-72c90eeb818c
Part 2: https://medium.com/geekculture/how-to-attack-admin-panels-successfully-part-2-9316c3caad3a
Medium
How To Attack Admin Panels Successfully
Attacking Web Apps Admin Panels The Right Way
Forwarded from Deadly malware xp
#Malware_analysis
1. Unpack Brute Ratel (BRC4) stager and extract config
https://github.com/matthw/malware_analysis/tree/main/brc4
2. Reversing AutoIT Scripts
https://isc.sans.edu/diary/AutoIT%20Remains%20Popular%20in%20the%20Malware%20Landscape/29408
3. A Deep Dive Into poweRAT: Stealer/RAT Combo Polluting PyPI
https://blog.phylum.io/a-deep-dive-into-powerat-a-newly-discovered-stealer/rat-combo-polluting-pypi
1. Unpack Brute Ratel (BRC4) stager and extract config
https://github.com/matthw/malware_analysis/tree/main/brc4
2. Reversing AutoIT Scripts
https://isc.sans.edu/diary/AutoIT%20Remains%20Popular%20in%20the%20Malware%20Landscape/29408
3. A Deep Dive Into poweRAT: Stealer/RAT Combo Polluting PyPI
https://blog.phylum.io/a-deep-dive-into-powerat-a-newly-discovered-stealer/rat-combo-polluting-pypi
GitHub
malware_analysis/brc4 at main · matthw/malware_analysis
Contribute to matthw/malware_analysis development by creating an account on GitHub.
Forwarded from Deadly malware xp
GitLab
Vesselin Bontchev / bpfdscan · GitLab
A BPFDoor scanner