Rust_for_C++_Programmers_Learn_how_to_embed_Rust_in_C:C++_with_ease.pdf
7.5 MB
Rust for C++ Programmers: Learn how to embed Rust in C/C++ with ease
ะะฒัะพั: Mustafif Khan (2023)
๐ก@hackLabel
ะะฒัะพั: Mustafif Khan (2023)
๐ก@hackLabel
โค4
Media is too big
VIEW IN TELEGRAM
SOC Analyst Training: How to Analyze Malicious PDFs
In this webinar we show:
โข Overview of the PDF file format
โข Attack vectors and techniques using PDF files
โข How investigators can detect and analyze potentially harmful PDF files
โข Learn how Intezer analyzes all types of files and helps in malware analysis investigations
โข A live demo of analyzing PDF files using open-source tools. We will work on files that were used in several phishing attacks that eventually infected the victims with backdoors and information stealing malware
๐Link: https://www.youtube.com/watch?v=AzXf7GV0jew&t=5s
๐ฅblog: https://intezer.com/blog/incident-response/analyze-malicious-pdf-files/
๐ก@hackLabel
In this webinar we show:
โข Overview of the PDF file format
โข Attack vectors and techniques using PDF files
โข How investigators can detect and analyze potentially harmful PDF files
โข Learn how Intezer analyzes all types of files and helps in malware analysis investigations
โข A live demo of analyzing PDF files using open-source tools. We will work on files that were used in several phishing attacks that eventually infected the victims with backdoors and information stealing malware
๐Link: https://www.youtube.com/watch?v=AzXf7GV0jew&t=5s
๐ฅblog: https://intezer.com/blog/incident-response/analyze-malicious-pdf-files/
๐ก@hackLabel
โค3๐1
This project is an open-source framework to enable obfuscation of constants, variables, and strings.
The obfuscation techniques implemented in this project are not intended to be foolproof. They serve as a foundation that should be enhanced further. The goal of this project is not to provide absolute protection but to obfuscate data effectively. Please note the provided code is designed for MSVC and requires C++17 or newer.
github: https://github.com/Sherman0236/XorData
๐ก@hackLabel
The obfuscation techniques implemented in this project are not intended to be foolproof. They serve as a foundation that should be enhanced further. The goal of this project is not to provide absolute protection but to obfuscate data effectively. Please note the provided code is designed for MSVC and requires C++17 or newer.
github: https://github.com/Sherman0236/XorData
๐ก@hackLabel
โค2
phrack
specialized Issues for hacking
Be sure to check : http://www.phrack.org/issues/70/1.html
๐ก@hackLabel
specialized Issues for hacking
Be sure to check : http://www.phrack.org/issues/70/1.html
๐ก@hackLabel
Assembly Refresher . Shellcode Injection . Exploitation Scenarios . Reverse Engineering . Return Oriented Programming . Advanced Exploitation . Memory Errors . . .
youtube: https://www.youtube.com/@pwncollege/videos
site: https://pwn.college/
๐ก@hackLabel
youtube: https://www.youtube.com/@pwncollege/videos
site: https://pwn.college/
๐ก@hackLabel
โค3
https://crackmes.one/ for increase your skills in reverse engineering and hacking.
discord: https://discord.com/invite/2pPV3yq
๐ก@hackLabel
discord: https://discord.com/invite/2pPV3yq
๐ก@hackLabel
๐5โค2
This media is not supported in your browser
VIEW IN TELEGRAM
โข๏ธreverse engineering courseโข๏ธ
github: https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
Twitter: https://twitter.com/0xZ0F
Discord: https://discord.gg/73tkPGv
๐ก@hackLabel
github: https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
Twitter: https://twitter.com/0xZ0F
Discord: https://discord.gg/73tkPGv
๐ก@hackLabel
โค3๐3๐คก1
This media is not supported in your browser
VIEW IN TELEGRAM
How to create a SIM card dump for reverse engineering
Learn how to create an image of a SIM card, such that it can be analyzed later.
This method is universal and it works with any card type (ex: SIM, USIM, RUIM, Nextel) from any mobile operator in the world.
SIM Dump can be downloaded from this address: files.dekart.com/beta/SimDump-pteryx.zip
SIM Explorer is distributed here: http://www.dekart.com/products/card_m
youtube: https://www.youtube.com/watch?v=ocJ4_4ZlHQs
๐ก@hackLabel
Learn how to create an image of a SIM card, such that it can be analyzed later.
This method is universal and it works with any card type (ex: SIM, USIM, RUIM, Nextel) from any mobile operator in the world.
SIM Dump can be downloaded from this address: files.dekart.com/beta/SimDump-pteryx.zip
SIM Explorer is distributed here: http://www.dekart.com/products/card_m
youtube: https://www.youtube.com/watch?v=ocJ4_4ZlHQs
๐ก@hackLabel
๐2โคโ๐ฅ1๐ฅ1๐ฑ1
Media is too big
VIEW IN TELEGRAM
Cracking A GSM Capture File In Real-time With AIRPROBE And KRAKEN
Additionally, l am not a GSM technology engineer, nor a cryptography expert. I do my best to explain these concepts in a simple and easy to understand way. But due to my limited knowledge of these subjects, it's possible that some of this information may be incorrect or lacking context.
However, this video will still allow you to crack a real GSM capture file if you are able to follow along with my flip-flopping style of presentation. Haha. But please, only replicate this tutorial on GSM data that originated from YOUR OWN mobile phone. Do not attempt to decrypt private telecommunications from any other cellular subscriber, EVER.
youtube: https://www.youtube.com/watch?v=EFLvHMJ5PHk
๐ก@hackLabel
Additionally, l am not a GSM technology engineer, nor a cryptography expert. I do my best to explain these concepts in a simple and easy to understand way. But due to my limited knowledge of these subjects, it's possible that some of this information may be incorrect or lacking context.
However, this video will still allow you to crack a real GSM capture file if you are able to follow along with my flip-flopping style of presentation. Haha. But please, only replicate this tutorial on GSM data that originated from YOUR OWN mobile phone. Do not attempt to decrypt private telecommunications from any other cellular subscriber, EVER.
youtube: https://www.youtube.com/watch?v=EFLvHMJ5PHk
๐ก@hackLabel
โค4โคโ๐ฅ1๐1
The Forensics Wiki is an open source website providing information related to digital forensics. The articles on the website cover a wide range of information from tools used during investigations to papers people and organizations that contribute to the field.
https://forensics.wiki/
For more information about Forensics Wiki on MediaWiki see:
โข Transitioning Forensics Wiki to GitHub
โข Contributions Forensics Wiki on MediaWiki
๐ก@hackLabel
https://forensics.wiki/
For more information about Forensics Wiki on MediaWiki see:
โข Transitioning Forensics Wiki to GitHub
โข Contributions Forensics Wiki on MediaWiki
๐ก@hackLabel
โค1๐1
โข Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals
โข Chrome Browser Exploitation, Part 2: Introduction to Ignition, Sparkplug and JIT Compilation via TurboFan
โข Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463
๐ก@hackLabel
โข Chrome Browser Exploitation, Part 2: Introduction to Ignition, Sparkplug and JIT Compilation via TurboFan
โข Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463
๐ก@hackLabel