Reverse Dungeon
4.39K subscribers
733 photos
59 videos
987 files
2.28K links
Reverser's notes
The Mentor
1989
Download Telegram
offensive rootkit development.pdf
3.4 MB
Offensive Rootkit Development
3
Forwarded from 0% Privacy
anti_firmware_forensics.pdf
7.5 MB
📕Detect Me If You Can - Anti-Firmware Forensics

📺 Download the recording of the speech.
SpiMitm.zip
44.6 KB
💥PoC: SpiMitm - SPI flash read MitM attack PoC for anti-firmware forensics

#security #forensics #fw #bootkit #MitM #SMMrootkit
Forwarded from Violent_Maid
При дебаге выдрал из ядра какой-то интересный MiComputeDriverProtection, оно вычисляет протект-маску для образа драйвера. Дизасма не будет, так как есть сорц. К DSE оно, судя по всему, не относится.
История powershell'а пользака

C:\Users\USER\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
2
Forwarded from CyberSecurityTechnologies (-CST-)
Bypassing_Buffer_Overflow.pdf
3.5 MB
#Research
#Threat_Research
"An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques", 2022.
Windows Exploitation Links


https://github.com/r3p3r/nixawk-awesome-windows-exploitation

https://github.com/connormcgarr/Exploit-Development

https://github.com/connormcgarr/Kernel-Exploits

https://github.com/ElliotAlderson51/Exploit-Writeups

https://github.com/rhamaa/Binary-exploit-writeups#windows_stack_overflows

https://github.com/wtsxDev/Exploit-Development

https://www.corelan.be

https://malwareunicorn.org/#/workshops

https://p.ost2.fyi

http://www.securitytube.net

https://ctf101.org/binary-exploitation/overview

Windows Stack Protection I: Assembly Code
http://www.bowneconsultingcontent.com//pub/EH/proj/cloud/ED301c_tkp/ED301c_tkp.htm

Windows Stack Protection II: Exploit Without ASLR
http://www.bowneconsultingcontent.com//pub/EH/proj/cloud/ED302c_tkp/ED302c_tkp.htm

Windows Stack Protection III: Limitations of ASLR
http://www.bowneconsultingcontent.com//pub/EH/proj/cloud/ED303c_tkp/ED303c_tkp.htm

Exploit Development
Ch 6: The Wild World of Windows
https://samsclass.info/127/lec/EDch6.pdf

SEH-Based Stack Overflow Exploit
https://samsclass.info/127/proj/ED319.htm

Exploiting Easy RM to MP3 Converter on Windows with ASLR
https://samsclass.info/127/proj/ED318.htm

Bypassing Browser Memory Protections
https://www.blackhat.com/presentations/bh-usa-08/Sotirov_Dowd/bh08-sotirov-dowd.pdf

The Basics of Exploit Development 1: Win32 Buffer Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development

The Basics of Exploit Development 2: SEH Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-2-seh-overflows

The Basics of Exploit Development 3: Egg Hunters
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-3-egg-hunters

The Basics of Exploit Development 4: Unicode Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-4-unicode-overfl

The Basics of Exploit Development 5: x86-64 Buffer Overflows
https://www.coalfire.com/the-coalfire-blog/the-basics-of-exploit-development-5-x86-64-buffer
🐳3