Aditya_Sood_and_Richard_Enbody_Auth_Targeted_Cyber_Attacks_Multi.pdf
5.5 MB
Targeted Cyber Attack - Aditya Sood, Richard Enbody [2014]
One-stop-shop references of Tactics and Technique of APT :
https://attack.mitre.org/techniques/enterprise/
https://attack.mitre.org/tactics/enterprise/
*a playbook if your wanted to be an APT, ehh
https://attack.mitre.org/techniques/enterprise/
https://attack.mitre.org/tactics/enterprise/
*a playbook if your wanted to be an APT, ehh
according this, conti had fastest implementation of AES algo compared other ransomware,
https://github.com/Cracked5pider/conti_locker
https://github.com/Cracked5pider/conti_locker
NHS England Digital
Conti Ransomware - NHS England Digital
Conti is an advanced ransomware tool that uses a unique encryption routine to identify and encrypt files incredibly quickly.
Making a simple PE packer tutorial for windows using C++ and CMake.
https://github.com/frank2/packer-tutorial
https://github.com/frank2/packer-tutorial
GitHub
GitHub - frank2/packer-tutorial: A tutorial on how to write a packer for Windows!
A tutorial on how to write a packer for Windows! Contribute to frank2/packer-tutorial development by creating an account on GitHub.
Forwarded from vx-underground
We see a new ransomware blog pop-up online every couple of weeks.
Apparently everyone and their grandma is in a ransomware group now.
Ransomwatch has a fairly comprehensive list: https://ransomwatch.telemetry.ltd/#/INDEX
Apparently everyone and their grandma is in a ransomware group now.
Ransomwatch has a fairly comprehensive list: https://ransomwatch.telemetry.ltd/#/INDEX
ransomwatch.telemetry.ltd
the transparent ransomware claim tracker π₯·πΌπ§
π₯οΈ
https://craftinginterpreters.com/contents.html
Writing a scanner and parser with hand is fun, I recomend try it as brain teaser.
Since the book use Java for the pre eliminary example, try implement it in language you like for more joyful experience.
Writing a scanner and parser with hand is fun, I recomend try it as brain teaser.
Since the book use Java for the pre eliminary example, try implement it in language you like for more joyful experience.
π₯1
Forwarded from Cyber0ΠΆff666 Ξ»
Exploit development resources
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://crackmes.one
https://www.youtube.com/@pwncollege/videos
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
http://www.phrack.org/issues/49/14.html#article
https://github.com/justinsteven/dostackbufferoverflowgood
https://github.com/FabioBaroni/awesome-exploit-development
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
https://github.com/RPISEC/MBE
https://github.com/hoppersroppers/nightmare
https://github.com/shellphish/how2heap
https://www.youtube.com/watch?v=tMN5N5oid2c
https://dayzerosec.com/blog/2021/02/02/getting-started.html
https://github.com/Tzaoh/pwning
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://crackmes.one
https://www.youtube.com/@pwncollege/videos
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
http://www.phrack.org/issues/49/14.html#article
https://github.com/justinsteven/dostackbufferoverflowgood
https://github.com/FabioBaroni/awesome-exploit-development
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
https://github.com/RPISEC/MBE
https://github.com/hoppersroppers/nightmare
https://github.com/shellphish/how2heap
https://www.youtube.com/watch?v=tMN5N5oid2c
https://dayzerosec.com/blog/2021/02/02/getting-started.html
https://github.com/Tzaoh/pwning
GitHub
GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
Reverse engineering focusing on x64 Windows. Contribute to 0xZ0F/Z0FCourse_ReverseEngineering development by creating an account on GitHub.
β€βπ₯1
Forwarded from Cyber0ΠΆff666 Ξ»
Malware development series
PART 1 - basics:
https://0xpat.github.io/Malware_development_part_1/
PART 2 - anti dynamic analysis & sandboxes:
https://0xpat.github.io/Malware_development_part_2/
PART 3 - anti-debugging:
https://0xpat.github.io/Malware_development_part_3/
PART 4 ββ- antistatic analysis tricks:
https://0xpat.github.io/Malware_development_part_4/
PART 5 - tips & tricks:
https://0xpat.github.io/Malware_development_part_5/
PART 6 - advanced obfuscation with LLVM and template metaprogramming:
https://0xpat.github.io/Malware_development_part_6/
PART 7 - Secure Desktop:
https://0xpat.github.io/Malware_development_part_7/
PART 8 - COFF injection and in-memory execution:
https://0xpat.github.io/Malware_development_part_8/
PART 9 - hosting CLR and managed code injection:
https://0xpat.github.io/Malware_development_part_9/
PART 1 - basics:
https://0xpat.github.io/Malware_development_part_1/
PART 2 - anti dynamic analysis & sandboxes:
https://0xpat.github.io/Malware_development_part_2/
PART 3 - anti-debugging:
https://0xpat.github.io/Malware_development_part_3/
PART 4 ββ- antistatic analysis tricks:
https://0xpat.github.io/Malware_development_part_4/
PART 5 - tips & tricks:
https://0xpat.github.io/Malware_development_part_5/
PART 6 - advanced obfuscation with LLVM and template metaprogramming:
https://0xpat.github.io/Malware_development_part_6/
PART 7 - Secure Desktop:
https://0xpat.github.io/Malware_development_part_7/
PART 8 - COFF injection and in-memory execution:
https://0xpat.github.io/Malware_development_part_8/
PART 9 - hosting CLR and managed code injection:
https://0xpat.github.io/Malware_development_part_9/
0xpat.github.io
Malware development part 1 - basics
Introduction
This is the first post of a series which regards development of malicious software. In this series we will explore and try to implement multiple techniques used by malicious applications to execute code, hide from defenses and persist.
Letβsβ¦
This is the first post of a series which regards development of malicious software. In this series we will explore and try to implement multiple techniques used by malicious applications to execute code, hide from defenses and persist.
Letβsβ¦
β€βπ₯1
Forwarded from Hacker News (yahnc_bot)
How the great firewall of China detects and blocks fully encrypted traffic [pdf] https://gfw.report/publications/usenixsecurity23/data/paper/paper.pdf
β€βπ₯1
Intro to Cryptography [pdf] (2011) https://www.cs.umd.edu/~waa/414-F11/IntroToCrypto.pdf
The hardest part of building software is not coding, it's requirements https://stackoverflow.blog/2023/06/26/the-hardest-part-of-building-software-is-not-coding-its-requirements/
stackoverflow.blog
The hardest part of building software is not coding, it's requirements - Stack Overflow
_Michael_Sipser_Introduction_to_the_Theory_of_Computation_2012,.pdf
5 MB
Introduction to Theory of Computation - Michael Sipser
Recommended book if you want deep dive into computer science core theory.
Recommended book if you want deep dive into computer science core theory.