π Part 1 of our #OALABS Patreon tutorial series on the PEB unlocked for everyoneβ¦
Understanding The PEB for Reverse Engineers
https://youtu.be/uyisPPTupmA
π£herrcore
π@malwr
Understanding The PEB for Reverse Engineers
https://youtu.be/uyisPPTupmA
π£herrcore
π@malwr
π₯1
Check Point's Alexey Bukhteyev & Arie Olshtein provide insights into GuLoader's evolution. GuLoader is a prominent shellcode-based downloader, active for more than 3 years, that has been used in a large number of attacks to deliver a wide range of malware. https://research.checkpoint.com/2023/cloud-based-malware-delivery-the-evolution-of-guloader/
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Nice quick introduction to persistence techniques in Windows by Ari Novick (@CyberArk)
https://www.cyberark.com/resources/threat-research-blog/persistence-techniques-that-persist
#cybersecurity
π£0xor0ne
π@malwr
https://www.cyberark.com/resources/threat-research-blog/persistence-techniques-that-persist
#cybersecurity
π£0xor0ne
π@malwr
I made a video of how to solve Hex-Ray's CTF using path driven symbolic execution by using Binary Ninja and the plugin SENinja. :) https://youtu.be/lay3PtTtubM
π£yates82
π@malwr
π£yates82
π@malwr
YouTube
Solving the Hex-Rays CTF using path driven symbolic execution.
Here I demonstrate how to solve the CTF using a binary ninja plugin called SENinja. Note that this version of the plugin shown in the video is part of a non-merged pull request of the plugin's master branch.
Nice reading on how to modify meterpreter for bypassing EDRs
Credits @VirtualAllocEx
https://redops.at/en/blog/meterpreter-vs-modern-edrs-in-2023
#redteam #infosec #cybersecurity #offsec
π£0xor0ne
π@malwr
Credits @VirtualAllocEx
https://redops.at/en/blog/meterpreter-vs-modern-edrs-in-2023
#redteam #infosec #cybersecurity #offsec
π£0xor0ne
π@malwr
π₯1
Hunting Lazarus Groupβs TTPs. Introduction | by montysecurity | May, 2023 | Medium https://montysecurity.medium.com/hunting-lazarus-groups-ttps-925c17469077
π£NeobeePaul
π@malwr
π£NeobeePaul
π@malwr
Medium
Hunting Lazarus Groupβs TTPs
Introduction
π₯1
Docker for Pentester
Abusing Docker API
https://www.hackingarticles.in/docker-for-pentester-abusing-docker-api/
Image Vulnerability Assessment
https://www.hackingarticles.in/docker-for-pentester-image-vulnerability-assessment/
Pentesting Framework
https://www.hackingarticles.in/docker-for-pentester-pentesting-framework/
Docker Privilege Escalation
https://www.hackingarticles.in/docker-privilege-escalation/
#infosec #cybersecurity #cybersecuritytips #pentestingβ¦
π£hackinarticles
π@malwr
Abusing Docker API
https://www.hackingarticles.in/docker-for-pentester-abusing-docker-api/
Image Vulnerability Assessment
https://www.hackingarticles.in/docker-for-pentester-image-vulnerability-assessment/
Pentesting Framework
https://www.hackingarticles.in/docker-for-pentester-pentesting-framework/
Docker Privilege Escalation
https://www.hackingarticles.in/docker-privilege-escalation/
#infosec #cybersecurity #cybersecuritytips #pentestingβ¦
π£hackinarticles
π@malwr
π₯2
Windows Security Log Quick Reference Cheat-sheet Credit:https://ultimatewindowssecurity.com/securitylog/quickref/Default.aspxβ¦β¦
#cybersecurity #pentesting #informationsecurity #hacking #DataSecurity #CyberSec #Hackers #bugbountytips #Linux #websecurity #Network #NetworkSecurity #cybersecurityawareness
π£Shubham_pen
π@malwr
#cybersecurity #pentesting #informationsecurity #hacking #DataSecurity #CyberSec #Hackers #bugbountytips #Linux #websecurity #Network #NetworkSecurity #cybersecurityawareness
π£Shubham_pen
π@malwr
Nice beginners series by @IntezerLabs on malware reverse engineering
Part 1: https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/
Part 2: https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/
#malware
π£0xor0ne
π@malwr
Part 1: https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/
Part 2: https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/
#malware
π£0xor0ne
π@malwr
π₯1