cookie

نحن نستخدم ملفات تعريف الارتباط لتحسين تجربة التصفح الخاصة بك. بالنقر على "قبول الكل"، أنت توافق على استخدام ملفات تعريف الارتباط.

avatar

Cyber Guardians

RedTeaming TTPs Bug Hunting Web PenTest Web Security Binary Analysis Exploit DEV Malware DEV Malware Analysis BlueTeaming Threat Hunting SOC CSIRT FORENSICS Open-Source Intelligence(OSINT) Cybersec Tools

إظهار المزيد
مشاركات الإعلانات
9 104
المشتركون
+4524 ساعات
+2257 أيام
+1 12530 أيام

جاري تحميل البيانات...

معدل نمو المشترك

جاري تحميل البيانات...

إظهار الكل...
Writing a PE Loader for the Xbox in 2024

Adventures in reinventing the wheel. Also: I hate thread-local storage.

إظهار الكل...
CVE-2024-38080/poc at master · pwndorei/CVE-2024-38080

poc code for CVE-2024-38080. Contribute to pwndorei/CVE-2024-38080 development by creating an account on GitHub.

LLM-based Fuzz Harness generation with OSS-Fuzz-gen - https://youtu.be/RR7CUyOtYXY?si=AvoF950UA0s7ReaK @IRCyberGuardians
إظهار الكل...
LLM-based Fuzz Harness generation with OSS-Fuzz-gen

This video is a short introduction on how to use OSS-Fuzz-gen to generate fuzzing harnesses.

In this one, I go into great detail about how malware walks the Process Environment Block (PEB) to find particular DLLs and parses their export table to find address of functions. https://nikhilh-20.github.io/blog/peb_phobos_ransomware/ @IRCyberGuardians
إظهار الكل...
Taking a Midnight Walk with PEB and Phobos Ransomware

M&M: Malware and Musings

Three-Headed Potato Dog: NTLM and Kerberos Coercion New research demonstrates how DCOM can coerce Windows systems to authenticate remotely, allowing attackers to relay NTLM or Kerberos authentication to AD CS over HTTP. This enables remote and cross-session authentication relay attacks, targeting both machine and user accounts. Research: https://blog.compass-security.com/2024/09/three-headed-potato-dog/ Source: https://github.com/sploutchy/impacket/blob/potato/examples/potato.py @IRCyberGuardians
إظهار الكل...
impacket/examples/potato.py at potato · sploutchy/impacket

Impacket is a collection of Python classes for working with network protocols. - sploutchy/impacket

A web scraping tool that extracts email addresses from websites or multiple URLs listed in a file. https://github.com/past3ll3/emailFinder @IRCyberGuardians
إظهار الكل...
GitHub - past3ll3/emailFinder: A web scraping tool that extracts email addresses from websites or multiple URLs listed in a file. It crawls through all page routes and parses content to find and display email addresses.

A web scraping tool that extracts email addresses from websites or multiple URLs listed in a file. It crawls through all page routes and parses content to find and display email addresses. - past3l...

Basic protection against HTML smuggling attempts. https://github.com/RootUp/SmuggleSheild @IRCyberGuardians
إظهار الكل...
GitHub - RootUp/SmuggleSheild: Basic protection against HTML smuggling attempts.

Basic protection against HTML smuggling attempts. Contribute to RootUp/SmuggleSheild development by creating an account on GitHub.

إظهار الكل...
Attacking PowerShell CLIXML Deserialization

In this article, we will learn that using PowerShell's CLIXML deserialization could lead to undesired effects, including remote code execution.

Malcore Malware Bible. This sacred text was created specifically to guide you on your journey into the realm of malware. Whether you are seeking to understand, master, or dominate this craft, these sacred texts have been forged from the fires below to bestow this forbidden knowledge upon thee. @IRCyberGuardians
إظهار الكل...
The Indoctrination | Malcore Malware Bible

Jailbreak your Enemies with a Link: Remote Execution on iOS The Trident Exploit Chain deep-dive (Part I) https://jacobbartlett.substack.com/p/jailbreak-enemies-with-a-link-remote-execution @IRCyberGuardians
إظهار الكل...
Jailbreak your Enemies with a Link: Remote Execution on iOS

The Trident Exploit Chain deep-dive (Part I)

اختر خطة مختلفة

تسمح خطتك الحالية بتحليلات لما لا يزيد عن 5 قنوات. للحصول على المزيد، يُرجى اختيار خطة مختلفة.