Source Byte


Kanal geosi va tili: Eron, Inglizcha


هشیار کسی باید کز عشق بپرهیزد
وین طبع که من دارم با عقل نیامیزد
Saadi Shirazi 187

Связанные каналы  |  Похожие каналы

Kanal geosi va tili
Eron, Inglizcha
Statistika
Postlar filtri


Telegram has deleted the channel 1N73LL1G3NC3 for some unknown reason. However, the author decided to continue sharing cool stuff and started the channel anew. Sharing

https://t.me/P0x3k_1N73LL1G3NC3


The Source Chat group has been banned, but we’re back with a new space. Join us to continue our discussions, share knowledge, and stay ahead in the security world. Let’s keep moving forward!

Group chat




we lost our previous group :(
have no idea why , telegram is so strange




Defeating malware's Anti-VM techniques (CPUID-Based Instructions)
By Sina Karvandi

https://rayanfam.com/topics/defeating-malware-anti-vm-techniques-cpuid-based-instructions/


[ deprecated_bytes ] dan repost
#reverse #IDA #hardware #research

.title
Mouse Adventures

.text
Wherein I delve into the internals of my no-name brand "Tecknet Hypertrak Gaming Mouse" in an attempt to write a cross-platform tool that can manipulate its configuration without having to use the awful Windows-only tool it's shipped with. In this first part we tear apart said tool to figure out how it communicates with the mouse.

.comment
Practical field story about "simple" hardware reverse engineering. Part 7 is noticeable as rare info about IDA's processor module creation.


.data
#1: Introduction
#2: Extracting the Firmware
#3: Writing a Disassembler
#4: Writing a custom tool
#5: Dumping and Parsing the USB Descriptors
#6: Enabling the Bootloader
#7: Writing an IDA Processor Module
#8: Dissecting the USB Code and Unbricking the Mouse

[ deprecated_bytes ]








/mdre/ dan repost


Malware Research / RedTeam / News dan repost
New blog on using CLR customizations to improve the OPSEC of your .NET execution harness. This includes a novel AMSI bypass that identified by author in 2023. By taking control of CLR assembly loads, we can load assemblies from memory with no AMSI scan.

https://securityintelligence.com/x-force/being-a-good-clr-host-modernizing-offensive-net-tradecraft/

Proof-of-concept for the AMSI bypass and an implementation of a CLR memory manager is on GitHub. We can implement custom memory routines and track all allocations made by the CLR.

https://github.com/passthehashbrowns/Being-A-Good-CLR-Host

#redteam #net #clr




GoDefender
Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package.


https://github.com/EvilBytecode/GoDefender.git






this year he ranked in top 3 :)






/v/‘s Video Memes dan repost
Video oldindan ko‘rish uchun mavjud emas
Telegram'da ko‘rish

20 ta oxirgi post ko‘rsatilgan.