I've made my recent Ghidra improments into one repository:
Ghidra's IDA like experience by @NyaMisty
https://github.com/NyaMisty/GhidraIDA
π£MiscMisty
π@malwr
Ghidra's IDA like experience by @NyaMisty
https://github.com/NyaMisty/GhidraIDA
π£MiscMisty
π@malwr
GitHub
GitHub - NyaMisty/GhidraIDA: Ghidra's IDA like experience by @NyaMisty
Ghidra's IDA like experience by @NyaMisty. Contribute to NyaMisty/GhidraIDA development by creating an account on GitHub.
Exploring iOS Applications with Frida and Objection: Basic Commands for Pentesting
https://link.medium.com/PNqr6rWs6xb
#Security #Pentesting #SecurityEveryday #BugBounty #Pentest #AppSec
π£busk3r
π@malwr
https://link.medium.com/PNqr6rWs6xb
#Security #Pentesting #SecurityEveryday #BugBounty #Pentest #AppSec
π£busk3r
π@malwr
Medium
Exploring iOS Applications with Frida and Objection: Basic Commands for Pentesting
Mobile application Pentesting is an essential part of securing any organizationβs mobile assets. To perform thorough penetration testing, aβ¦
(1/2)
Here's a list of a few tools that can be useful for firmware unpacking, repacking and
analysis
binwalk: https://github.com/ReFirmLabs/binwalk
EMBA: https://github.com/e-m-b-a/emba
unblob: https://github.com/onekey-sec/unblob
#iot #embedded #reverseengineering #infosec ##cybersecurity
π£0xor0ne
π@malwr
Here's a list of a few tools that can be useful for firmware unpacking, repacking and
analysis
binwalk: https://github.com/ReFirmLabs/binwalk
EMBA: https://github.com/e-m-b-a/emba
unblob: https://github.com/onekey-sec/unblob
#iot #embedded #reverseengineering #infosec ##cybersecurity
π£0xor0ne
π@malwr
Researchers from Palo Alto Networks' Unit 42 Team recently discovered a new sample of Golang-based malware. GoBruteforcer targets web servers, specifically those running phpMyAdmin, MySQL, FTP and Postgres services. https://unit42.paloaltonetworks.com/gobruteforcer-golang-botnet/
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Linux Kernel Rootkits:
Part 3: A Backdoor to Root : https://xcellerator.github.io/posts/linux_rootkits_03/
Part 2: Ftrace and Function Hooking : https://xcellerator.github.io/posts/linux_rootkits_02/
Part 1: Introduction and Workflow : https://xcellerator.github.io/posts/linux_rootkits_01/ @TheXcellerator
DIY Linux Kernel Rootkit Detection : https://unfinished.bike/diy-linux-kernel-rootkit-detection
π£binitamshah
π@malwr
Part 3: A Backdoor to Root : https://xcellerator.github.io/posts/linux_rootkits_03/
Part 2: Ftrace and Function Hooking : https://xcellerator.github.io/posts/linux_rootkits_02/
Part 1: Introduction and Workflow : https://xcellerator.github.io/posts/linux_rootkits_01/ @TheXcellerator
DIY Linux Kernel Rootkit Detection : https://unfinished.bike/diy-linux-kernel-rootkit-detection
π£binitamshah
π@malwr
Linux Rootkits Part 3: A Backdoor to Root
Linux Rootkits Part 3: A Backdoor to Root :: TheXcellerator
Now that you know how to make a Linux kernel module that can hook any exposed function in kernel memory (Part 1 and Part 2), letβs get down to writing a hook that does something interesting!
In this first example, weβre going to make a rootkit that interceptsβ¦
In this first example, weβre going to make a rootkit that interceptsβ¦
Google Cloud Platform Exfiltration : A Threat Hunting Guide : https://www.mitiga.io/blog/google-cloud-platform-exfiltration-a-threat-hunting-guide
π£binitamshah
π@malwr
π£binitamshah
π@malwr
Blink : tiniest x86-64-linux emulator : https://github.com/jart/blink credits @JustineTunney
cosmopolitan : build-once run-anywhere c library : https://github.com/jart/cosmopolitan
π£binitamshah
π@malwr
cosmopolitan : build-once run-anywhere c library : https://github.com/jart/cosmopolitan
π£binitamshah
π@malwr
Modern x64 Assembly ( 16 Part video series) : https://www.youtube.com/watch?v=rxsBghsrvpI&list=PLKK11Ligqitg9MOX3-0tFT1Rmh3uJp7kA
π£binitamshah
π@malwr
π£binitamshah
π@malwr
YouTube
Modern x64 Assembly 1: Beginning Assembly Programming
A new series on x64 Assembly language. In this vid, we'll look at few general aspects of ASM, before diving in and coding a few simple examples.
I wanted to redo my early ASM vids for a while, and I hope this series is as fun as the original one was, plusβ¦
I wanted to redo my early ASM vids for a while, and I hope this series is as fun as the original one was, plusβ¦
Win32 Offensive Cheatsheet
Win32 and Kernel abusing techniques for pentesters & red-teamers.
https://github.com/matthieu-hackwitharts/Win32_Offensive_Cheatsheet
#pentesting #redteam https://t.me/hackgit/7899
π£hack_git
π@malwr
Win32 and Kernel abusing techniques for pentesters & red-teamers.
https://github.com/matthieu-hackwitharts/Win32_Offensive_Cheatsheet
#pentesting #redteam https://t.me/hackgit/7899
π£hack_git
π@malwr
π₯2
Technical analysis of NSO's Pegasus Android spyware by CyberMasterV (@GeeksCyber)
Part 1: https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-1/
Part 2: https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-2/
Part 3: https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-3/
#android #malware #nso #pegasus #infosec #cybersecurity
π£0xor0ne
π@malwr
Part 1: https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-1/
Part 2: https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-2/
Part 3: https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-3/
#android #malware #nso #pegasus #infosec #cybersecurity
π£0xor0ne
π@malwr
β€3
Released my sRDI (Shellcode Reflective DLL Injection) implementation.
https://github.com/daem0nc0re/TangledWinExec/tree/main/sRDI
π£daem0nc0re
π@malwr
https://github.com/daem0nc0re/TangledWinExec/tree/main/sRDI
π£daem0nc0re
π@malwr
π2
Want to learn about EoP on windows? check this amazing series from @hasherezade
https://hshrzd.wordpress.com/2017/06/22/starting-with-windows-kernel-exploitation-part-3-stealing-the-access-token/
π£hardik05
π@malwr
https://hshrzd.wordpress.com/2017/06/22/starting-with-windows-kernel-exploitation-part-3-stealing-the-access-token/
π£hardik05
π@malwr
hasherezade's 1001 nights
Starting with Windows Kernel Exploitation β part 3 β stealing the Access Token
Recently I started learning Windows Kernel Exploitation, so I decided to share some of my notes in form of a blog. In the previous parts I shown how to set up the environment. Now we will get familβ¦
π1
Win32 and Kernel abusing techniques for pentesters
https://github.com/matthieu-hackwitharts/Win32_Offensive_Cheatsheet
π£Dinosn
π@malwr
https://github.com/matthieu-hackwitharts/Win32_Offensive_Cheatsheet
π£Dinosn
π@malwr
GitHub
GitHub - matthieu-hackwitharts/Win32_Offensive_Cheatsheet: Win32 and Kernel abusing techniques for pentesters
Win32 and Kernel abusing techniques for pentesters - matthieu-hackwitharts/Win32_Offensive_Cheatsheet
π₯1