Malware development: Persistence:
Part 1: Registry run keys. C++ example: https://cocomelonc.github.io/tutorial/2022/04/20/malware-pers-1.html
2: https://cocomelonc.github.io/tutorial/2022/04/26/malware-pers-2.html
3: https://cocomelonc.github.io/tutorial/2022/05/02/malware-pers-3.html
4: https://cocomelonc.github.io/tutorial/2022/05/09/malware-pers-4.html
5: https://cocomelonc.github.io/tutorial/2022/05/16/malware-pers-5.html
6: https://cocomelonc.github.io/tutorial/2022/05/29/malware-pers-6.html
7 https://cocomelonc.github.io/tutorial/2022/06/12/malware-pers-7.html cr @cocomelonckz
π£binitamshah
π@malwr
Part 1: Registry run keys. C++ example: https://cocomelonc.github.io/tutorial/2022/04/20/malware-pers-1.html
2: https://cocomelonc.github.io/tutorial/2022/04/26/malware-pers-2.html
3: https://cocomelonc.github.io/tutorial/2022/05/02/malware-pers-3.html
4: https://cocomelonc.github.io/tutorial/2022/05/09/malware-pers-4.html
5: https://cocomelonc.github.io/tutorial/2022/05/16/malware-pers-5.html
6: https://cocomelonc.github.io/tutorial/2022/05/29/malware-pers-6.html
7 https://cocomelonc.github.io/tutorial/2022/06/12/malware-pers-7.html cr @cocomelonckz
π£binitamshah
π@malwr
cocomelonc
Malware development: persistence - part 1. Registry run keys. C++ example.
ο·½
ESET researchers analysed a recent Mustang Panda backdoor which is part of an ongoing campaign. MQsTTang (Kumquat) uses the MQTT protocol for C&C communication, one of the benefits of which is that it hides the rest of the infrastructure behind a broker. https://www.welivesecurity.com/2023/03/02/mqsttang-mustang-panda-latest-backdoor-treads-new-ground-qt-mqtt/
π£virusbtn
π@malwr
π£virusbtn
π@malwr
π2
"Incident Response in Azure "
#pentest #redteam #infosec
https://invictus-ir.medium.com/incident-response-in-azure-c3830e7783af
π£CyberWarship
π@malwr
#pentest #redteam #infosec
https://invictus-ir.medium.com/incident-response-in-azure-c3830e7783af
π£CyberWarship
π@malwr
How to break the onlyfans paywall, is it posible
?
π£chamodhb7
The amount of effort required would probably not be worth it. Just pay the fee or go to pornhub for free bro
π€Packathonjohn
Horny fuck
π€TheGOATofMinecraft99
Anything is possible if you try hard enough.
π€Doc-Brown1911
#Fun
π@malwr
?
π£chamodhb7
The amount of effort required would probably not be worth it. Just pay the fee or go to pornhub for free bro
π€Packathonjohn
Horny fuck
π€TheGOATofMinecraft99
Anything is possible if you try hard enough.
π€Doc-Brown1911
#Fun
π@malwr
Reddit
How to break the onlyfans paywall, is it posible : r/Hacking_Tutorials
231K subscribers in the Hacking_Tutorials community. Hacking Tutorials is a sub where Redditors can post various resources that discuss and teach theβ¦
π1
refinery: High Octane Triage Analysis - The Binary Refineryβ’ is a collection of Python scripts that implement transformations of binary data such as compression and encryption
π£digicat
π@malwr
π£digicat
π@malwr
GitHub
GitHub - binref/refinery: High Octane Triage Analysis
High Octane Triage Analysis. Contribute to binref/refinery development by creating an account on GitHub.
Quick introduction on how to set up Ghidra for analysing bare metal firmwares by @attifyme
https://blog.attify.com/analyzing-bare-metal-firmware-binaries-in-ghidra/
#reverseengineering #embedded #iot #hacking #beginner
π£0xor0ne
π@malwr
https://blog.attify.com/analyzing-bare-metal-firmware-binaries-in-ghidra/
#reverseengineering #embedded #iot #hacking #beginner
π£0xor0ne
π@malwr
Hyundai infotainment system hacking.
Short series by @rgerganov
Part 1: https://xakcop.com/post/hyundai-hack/
Part 2: https://xakcop.com/post/hyundai-hack-2/
#carhacking #hyundai #infosec #cybersecurity #reverseengineering
π£0xor0ne
π@malwr
Short series by @rgerganov
Part 1: https://xakcop.com/post/hyundai-hack/
Part 2: https://xakcop.com/post/hyundai-hack-2/
#carhacking #hyundai #infosec #cybersecurity #reverseengineering
π£0xor0ne
π@malwr
Want to know from which source file line a specific instruction comes? With the right debug info, IDA can show you that π https://hex-rays.com/blog/igors-tip-of-the-week-130-source-line-numbers/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=Igor-Tip-130
#IgorsTipOfTheWeek #IDAtips #IDAPro
π£HexRaysSA
π@malwr
#IgorsTipOfTheWeek #IDAtips #IDAPro
π£HexRaysSA
π@malwr
Hereβs a tutorial on how to unpack Android APKs with the Medusa framework!
This is an alternative method of decoding using dynamic analysis rather than static analysis which I used in my previous video: Writing a Custom Android Decryptor in Java.
https://youtu.be/ffM5R2Wfl0A
π£lauriewired
π@malwr
This is an alternative method of decoding using dynamic analysis rather than static analysis which I used in my previous video: Writing a Custom Android Decryptor in Java.
https://youtu.be/ffM5R2Wfl0A
π£lauriewired
π@malwr
YouTube
Unpacking Android APKs with Medusa
In this video, we unpack a packed APK using the Medusa framework and dynamic analysis.
Timestamps:
00:00 Intro
00:38 Opening Sample
02:04 Recap writing custom decryptor
03:24 Medusa Framework
05:22 Finding DexClassLoader in code
06:52 Running Medusa in aβ¦
Timestamps:
00:00 Intro
00:38 Opening Sample
02:04 Recap writing custom decryptor
03:24 Medusa Framework
05:22 Finding DexClassLoader in code
06:52 Running Medusa in aβ¦