"Incident Response in Azure "
#pentest #redteam #infosec
https://invictus-ir.medium.com/incident-response-in-azure-c3830e7783af
π£CyberWarship
π@malwr
#pentest #redteam #infosec
https://invictus-ir.medium.com/incident-response-in-azure-c3830e7783af
π£CyberWarship
π@malwr
How to break the onlyfans paywall, is it posible
?
π£chamodhb7
The amount of effort required would probably not be worth it. Just pay the fee or go to pornhub for free bro
π€Packathonjohn
Horny fuck
π€TheGOATofMinecraft99
Anything is possible if you try hard enough.
π€Doc-Brown1911
#Fun
π@malwr
?
π£chamodhb7
The amount of effort required would probably not be worth it. Just pay the fee or go to pornhub for free bro
π€Packathonjohn
Horny fuck
π€TheGOATofMinecraft99
Anything is possible if you try hard enough.
π€Doc-Brown1911
#Fun
π@malwr
Reddit
How to break the onlyfans paywall, is it posible : r/Hacking_Tutorials
231K subscribers in the Hacking_Tutorials community. Hacking Tutorials is a sub where Redditors can post various resources that discuss and teach theβ¦
π1
refinery: High Octane Triage Analysis - The Binary Refineryβ’ is a collection of Python scripts that implement transformations of binary data such as compression and encryption
π£digicat
π@malwr
π£digicat
π@malwr
GitHub
GitHub - binref/refinery: High Octane Triage Analysis
High Octane Triage Analysis. Contribute to binref/refinery development by creating an account on GitHub.
Quick introduction on how to set up Ghidra for analysing bare metal firmwares by @attifyme
https://blog.attify.com/analyzing-bare-metal-firmware-binaries-in-ghidra/
#reverseengineering #embedded #iot #hacking #beginner
π£0xor0ne
π@malwr
https://blog.attify.com/analyzing-bare-metal-firmware-binaries-in-ghidra/
#reverseengineering #embedded #iot #hacking #beginner
π£0xor0ne
π@malwr
Hyundai infotainment system hacking.
Short series by @rgerganov
Part 1: https://xakcop.com/post/hyundai-hack/
Part 2: https://xakcop.com/post/hyundai-hack-2/
#carhacking #hyundai #infosec #cybersecurity #reverseengineering
π£0xor0ne
π@malwr
Short series by @rgerganov
Part 1: https://xakcop.com/post/hyundai-hack/
Part 2: https://xakcop.com/post/hyundai-hack-2/
#carhacking #hyundai #infosec #cybersecurity #reverseengineering
π£0xor0ne
π@malwr
Want to know from which source file line a specific instruction comes? With the right debug info, IDA can show you that π https://hex-rays.com/blog/igors-tip-of-the-week-130-source-line-numbers/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=Igor-Tip-130
#IgorsTipOfTheWeek #IDAtips #IDAPro
π£HexRaysSA
π@malwr
#IgorsTipOfTheWeek #IDAtips #IDAPro
π£HexRaysSA
π@malwr
Hereβs a tutorial on how to unpack Android APKs with the Medusa framework!
This is an alternative method of decoding using dynamic analysis rather than static analysis which I used in my previous video: Writing a Custom Android Decryptor in Java.
https://youtu.be/ffM5R2Wfl0A
π£lauriewired
π@malwr
This is an alternative method of decoding using dynamic analysis rather than static analysis which I used in my previous video: Writing a Custom Android Decryptor in Java.
https://youtu.be/ffM5R2Wfl0A
π£lauriewired
π@malwr
YouTube
Unpacking Android APKs with Medusa
In this video, we unpack a packed APK using the Medusa framework and dynamic analysis.
Timestamps:
00:00 Intro
00:38 Opening Sample
02:04 Recap writing custom decryptor
03:24 Medusa Framework
05:22 Finding DexClassLoader in code
06:52 Running Medusa in aβ¦
Timestamps:
00:00 Intro
00:38 Opening Sample
02:04 Recap writing custom decryptor
03:24 Medusa Framework
05:22 Finding DexClassLoader in code
06:52 Running Medusa in aβ¦
I have written a brief article explaining how compilation units matching work in #Diaphora:
https://github.com/joxeankoret/diaphora/blob/master/doc/articles/compilation_units.md
π£matalaz
π@malwr
https://github.com/joxeankoret/diaphora/blob/master/doc/articles/compilation_units.md
π£matalaz
π@malwr
I just published my implementation of call stack spoofing using hardware breakpoints π
Works for syscalls and APIs, supports x64, x86 and WoW64.
https://www.coresecurity.com/blog/hardware-call-stack
π£s4ntiago_p
π@malwr
Works for syscalls and APIs, supports x64, x86 and WoW64.
https://www.coresecurity.com/blog/hardware-call-stack
π£s4ntiago_p
π@malwr
Coresecurity
Hardware Call Stack | Core Security
Read about a unique implementation of call stack spoofing, which defenders have started to leverage valid call stacks to detect malicious behavior.
The Red Report 2023 β A comprehensive analysis of the most prevalent TTPs used in 2022, and how they were leveraged by threat actors. Based on an in-depth analysis of over 500,000 real-world malware samples collected from a wide range of sources.
https://drive.google.com/file/d/1Rp2QF4e5-zvdtPJApaiRQEGtscweb8SV/view
π£snkhan
π@malwr
https://drive.google.com/file/d/1Rp2QF4e5-zvdtPJApaiRQEGtscweb8SV/view
π£snkhan
π@malwr
π1