Linux, Material de hacking y noticias
@Linux_and_hacking_material
1.47K
subscribers
246
photos
28
videos
3.36K
files
9.66K
links
Canal destinado a diversos contenidos: material de Linux, hacking y seguridad informática
Download Telegram
Join
Linux, Material de hacking y noticias
1.47K subscribers
Linux, Material de hacking y noticias
https://github.com/MobSF/Mobile-Security-Framework-MobSF
GitHub
GitHub - MobSF/Mobile-Security-Framework-MobSF: Mobile Security Framework (MobSF) is an automated, all-in-one mobile application…
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static a...
Linux, Material de hacking y noticias
https://m.youtube.com/watch?v=HH0jzSzgDsE
YouTube
TryHackme Pentesting P3: sqlmap, smbmap and smbclient
In this video walkthrough, we explained sqlmap, smbmap and smbclient in the third part of cc pentesting from tryhackme.
----
Receive video documentation
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
----
Do you need private cybersecurity…
Linux, Material de hacking y noticias
https://isc.sans.edu/forums/diary/Powershell+Dropping+a+REvil+Ransomware/27012
Linux, Material de hacking y noticias
https://decoder.cloud/2017/06/15/simple-aslrnx-bypass-on-a-linux-32-bit-binary/
Decoder's Blog
Simple ASLR/NX bypass on a Linux 32 bit binary
In this article we will try to bypass the ASLR (Address Space Layout Randomization) and NX (non execute bit) techniques. So we got this 32 bit binary “overflow” without source code and…
Linux, Material de hacking y noticias
https://0xc0decafe.com/malware-analyst-guide-to-pe-timestamps/
0Xc0Decafe
The malware analyst’s guide to PE timestamps
From l0w to h1gh level - full stack cyber!
Linux, Material de hacking y noticias
https://secret.club/2021/01/20/diet-process.html
secret club
Process on a diet: anti-debug using job objects
Investigating job object-based anti-debug by limiting memory usage
Linux, Material de hacking y noticias
https://research.nccgroup.com/2021/01/10/building-an-rdp-credential-catcher-for-threat-intelligence/
Linux, Material de hacking y noticias
https://nasbench.medium.com/common-tools-techniques-used-by-threat-actors-and-malware-part-i-deb05b664879
Medium
Common Tools & Techniques Used By Threat Actors and Malware — Part I
If you’ve been keeping up with the information security world even for a little bit, you’ve certainly heard of the recent supply chain…
Linux, Material de hacking y noticias
https://docs.google.com/presentation/d/13Ew3rzjGow1w444hJg8rWmCuaKakPa7XBUcNe0r1vvI/mobilepresent#slide=id.g35f391192_00
Linux, Material de hacking y noticias
https://m.youtube.com/watch?v=t_YKHZfwwvs
YouTube
The Absolute Beginner Pentesting : Pickle Rick CTF TryHackMe
Receive video documentation
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
----
Do you need private cybersecurity training? sign up here
https://motasem-notes.net/cybersecurity-consultation/
--
Twitter
https://twitter.com/ManMotasem
LinkedIn…
Linux, Material de hacking y noticias
https://viralhacks.net/1IhNiE
Linux, Material de hacking y noticias
https://nasbench.medium.com/common-tools-techniques-used-by-threat-actors-and-malware-part-i-deb05b664879
Medium
Common Tools & Techniques Used By Threat Actors and Malware — Part I
If you’ve been keeping up with the information security world even for a little bit, you’ve certainly heard of the recent supply chain…
Linux, Material de hacking y noticias
https://github.com/mattnotmax/cyberchef-recipes
GitHub
GitHub - mattnotmax/cyberchef-recipes: A list of cyber-chef recipes and curated links
A list of cyber-chef recipes and curated links. Contribute to mattnotmax/cyberchef-recipes development by creating an account on GitHub.
Linux, Material de hacking y noticias
https://offensivedefence.co.uk/posts/dinvoke-syscalls/
offensivedefence.co.uk
Syscalls with D/Invoke
Windows Architecture Primer x86 processors have 4 privilege levels, known as rings, that control access to memory and CPU operations. They range from Ring 0, the most privileged, to Ring 3.
Image credit: Wikipedia
Windows only supports Rings 0 and 3, affectionately…
Linux, Material de hacking y noticias
https://shells.systems/unveiling-bughound-a-static-code-analysis-tool-based-on-elasticsearch/
Shells.Systems
Unveiling BugHound: a static code analysis tool based on ElasticSearch - Shells.Systems
Estimated Reading Time: 7 minutes In the last couple of weeks, I was doing some code analysis for a couple of products, some of them were part of my daily job and the other was for research purposes. During this period, I was trying to do automation for my…
Linux, Material de hacking y noticias
https://medium.com/malware-buddy/reverse-engineering-tips-binary-diffing-17760bd89f39
Medium
[Reverse Engineering Tips] — Binary Diffing
Binary diffing is a great way to visualize and spot differences in multiple samples. As a malware researcher, this is useful for…
Linux, Material de hacking y noticias
https://github.com/mattnotmax/cyberchef-recipes
GitHub
GitHub - mattnotmax/cyberchef-recipes: A list of cyber-chef recipes and curated links
A list of cyber-chef recipes and curated links. Contribute to mattnotmax/cyberchef-recipes development by creating an account on GitHub.
Linux, Material de hacking y noticias
https://www.youtube.com/watch?v=t_YKHZfwwvs
YouTube
The Absolute Beginner Pentesting : Pickle Rick CTF TryHackMe
🚀
Cyber Security Certification Notes
https://shop.motasem-notes.net/collections/cyber-security-study-notes
🚀
OR Certification Notes with Cheat Sheets
https://buymeacoffee.com/notescatalog/extras
💡
Cyber Security Notes | Membership Access
https://buymeacoff…
Linux, Material de hacking y noticias
https://nasbench.medium.com/common-tools-techniques-used-by-threat-actors-and-malware-part-i-deb05b664879
Medium
Common Tools & Techniques Used By Threat Actors and Malware — Part I
If you’ve been keeping up with the information security world even for a little bit, you’ve certainly heard of the recent supply chain…
Linux, Material de hacking y noticias
https://darrenmartyn.ie/2021/01/24/visualdoor-sonicwall-ssl-vpn-exploit/