CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from Deadly malware xp
#Red_Team_Tactics
1. Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime
https://github.com/D1rkMtr/UnhookingPatch
2. A new AMSI Bypass technique using .NET ALI Call Hooking
https://github.com/pracsec/AmsiBypassHookManagedAPI
3. Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID
https://github.com/D1rkMtr/FilelessNtdllReflection
1
Forwarded from Deadly malware xp
#Blue_Team_Techniques
1. Recognizing the APT groups most likely responsible for a cybersecurity incident from the MITRE ATT&CK techniques in the incident report of the incident
https://gitlab.com/bontchev/whodunit
2. Open source tool to aid in SOC investigations
https://github.com/zdhenard42/SOC-Multitool
Forwarded from Deadly malware xp
IPv6_security.pdf
14.3 MB
#Whitepaper
"IPv6 Security Guide", 2022.
👍1
Forwarded from Deadly malware xp
👍1
Forwarded from Deadly malware xp
Supply_Chains_Taxonomy.pdf
896.7 KB
#Research
"Taxonomy of Attacks on Open-Source Software Supply Chains", 2022.
]-> https://riskexplorer.endorlabs.com/#/attack-tree
Forwarded from Deadly malware xp
GLeeFuzz.pdf
6 MB
#Fuzzing
"GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation", 2022.
]-> Repo: https://github.com/HexHive/GLeeFuzz
Forwarded from Deadly malware xp
PhiAttack.pdf
179 KB
#Red_Team_Tactics
"PhiAttack: Rewriting the Java Card Class Hierarchy", 2021.
Forwarded from Deadly malware xp
Java_Card_Security.pdf
1.3 MB
#Threat_Research
"Good, Bad and Ugly Design of Java Card Security" (Master’s Thesis).

// This thesis is focused on the study of logical attacks on the Java Card platform which try to exploit bugs in the implementation of the Java Card specification or try to break the security of the virtual machine by installing malformed applets. Although logical attacks are not as universal and powerful as physical attacks, it does not require expensive equipment and scales quite well...
Forwarded from Deadly malware xp
Text_to_SQL_Models.pdf
7.4 MB
#Research
#Threat_Research
"On the Security Vulnerabilities of Text-to-SQL Models", 2022.
Forwarded from Deadly malware xp
Python_for_Cybersecurity.pdf
8.9 MB
#Tech_book
"Python for Cybersecurity: Using Python for Cyber Offense and Defense", 2022.
Geolocation Spy (GeoSpy) - is an OSINT analysis and research tool that is used to track and execute intelligent social engineering attacks in real time.
▫️https://github.com/askmetoo/geospy