CodeBitch1's profile picture. CodeBitch

CodeBitch

@CodeBitch1

CodeBitch

CodeBitch đã đăng lại

Intel Processor Trace may be a useful utility to determine if backdoor code is consuming too many CPU cycles.


CodeBitch đã đăng lại

Reverse engineering and vulnerability analysis of DJI drones' firmware. A two-parts blog series by @nozominetworks Firmware Analysis: nozominetworks.com/blog/dji-mavic… Vulnerability Analysis: nozominetworks.com/blog/dji-mavic… Particularly interesting is the chain of weak Wi-Fi password cracking…

0xor0ne's tweet image. Reverse engineering and vulnerability analysis of DJI drones' firmware.
A two-parts blog series by @nozominetworks

Firmware Analysis: nozominetworks.com/blog/dji-mavic…
Vulnerability Analysis: nozominetworks.com/blog/dji-mavic…

Particularly interesting is the chain of weak Wi-Fi password cracking…
0xor0ne's tweet image. Reverse engineering and vulnerability analysis of DJI drones' firmware.
A two-parts blog series by @nozominetworks

Firmware Analysis: nozominetworks.com/blog/dji-mavic…
Vulnerability Analysis: nozominetworks.com/blog/dji-mavic…

Particularly interesting is the chain of weak Wi-Fi password cracking…
0xor0ne's tweet image. Reverse engineering and vulnerability analysis of DJI drones' firmware.
A two-parts blog series by @nozominetworks

Firmware Analysis: nozominetworks.com/blog/dji-mavic…
Vulnerability Analysis: nozominetworks.com/blog/dji-mavic…

Particularly interesting is the chain of weak Wi-Fi password cracking…

CodeBitch đã đăng lại

Create videos within ChatGPT 🪄 Try our VideoMaker on the GPT Store >> ChatGPT Plus required ✨


CodeBitch đã đăng lại

Accidentally compressed 50,000+ malware samples with the password 'infecyed'.

vxunderground's tweet image. Accidentally compressed 50,000+ malware samples with the password 'infecyed'.

CodeBitch đã đăng lại

Looks very interesting, definitely going to give it a try!

vscode-container-wasm: An Extension of VSCode on Browser for Running Containers Within Your Browser at FOSDEM2024! By @TokunagaKohei github.com/ktock/vscode-c… github.com/ktock/containe…

ming_rrr's tweet image. vscode-container-wasm: An Extension of VSCode on Browser for Running Containers Within Your Browser at FOSDEM2024!

By @TokunagaKohei

github.com/ktock/vscode-c…
github.com/ktock/containe…
ming_rrr's tweet image. vscode-container-wasm: An Extension of VSCode on Browser for Running Containers Within Your Browser at FOSDEM2024!

By @TokunagaKohei

github.com/ktock/vscode-c…
github.com/ktock/containe…


CodeBitch đã đăng lại

16 courses on @pluralsight down and the next one in progress.. this time the focus will be on #assembly basics! For now, check out what is already there 👇 ☑️ pluralsight.com/authors/josh-s… These courses can help jump start your learning in malware analysis!

jstrosch's tweet image. 16 courses on @pluralsight down and the next one in progress.. this time the focus will be on #assembly basics! For now, check out what is already there 👇

☑️ pluralsight.com/authors/josh-s…

These courses can help jump start your learning in malware analysis!

CodeBitch đã đăng lại

Analysis of the Huawei Security Hypervisor Worth a reading! Credits @the_impalabs Hypervisor analysis: blog.impalabs.com/2212_huawei-se… OOB vuln: blog.impalabs.com/2212_advisory_… #huawei #infosec

0xor0ne's tweet image. Analysis of the Huawei Security Hypervisor
Worth a reading!
Credits @the_impalabs

Hypervisor analysis: blog.impalabs.com/2212_huawei-se…
OOB vuln: blog.impalabs.com/2212_advisory_…

#huawei #infosec
0xor0ne's tweet image. Analysis of the Huawei Security Hypervisor
Worth a reading!
Credits @the_impalabs

Hypervisor analysis: blog.impalabs.com/2212_huawei-se…
OOB vuln: blog.impalabs.com/2212_advisory_…

#huawei #infosec
0xor0ne's tweet image. Analysis of the Huawei Security Hypervisor
Worth a reading!
Credits @the_impalabs

Hypervisor analysis: blog.impalabs.com/2212_huawei-se…
OOB vuln: blog.impalabs.com/2212_advisory_…

#huawei #infosec
0xor0ne's tweet image. Analysis of the Huawei Security Hypervisor
Worth a reading!
Credits @the_impalabs

Hypervisor analysis: blog.impalabs.com/2212_huawei-se…
OOB vuln: blog.impalabs.com/2212_advisory_…

#huawei #infosec

CodeBitch đã đăng lại

✝️The Holy Trinity of Game Hacking✝️ ✅Cheat Engine ☑️ReClass . NET ✅IDA Pro Learn how we use them together to find and reverse engineer the TraceLine Function 👉youtu.be/hZQzJkzmPG4

GuidedHacking's tweet image. ✝️The Holy Trinity of Game Hacking✝️

✅Cheat Engine
☑️ReClass . NET
✅IDA Pro

Learn how we use them together to find and reverse engineer the TraceLine Function

👉youtu.be/hZQzJkzmPG4

CodeBitch đã đăng lại

If you have failed the "OTHER CHECKS" for the League of Legends Vanguard checks, you can download github.com/rcmaehl/WhyNot… to determine which Windows security features you have disabled. You can easily fix them as a visual aid, and once you are done, you should be ready for the…

AntiCheatPD's tweet image. If you have failed the "OTHER CHECKS" for the League of Legends Vanguard checks, you can download github.com/rcmaehl/WhyNot… 

to determine which Windows security features you have disabled. You can easily fix them as a visual aid, and once you are done, you should be ready for the…
AntiCheatPD's tweet image. If you have failed the "OTHER CHECKS" for the League of Legends Vanguard checks, you can download github.com/rcmaehl/WhyNot… 

to determine which Windows security features you have disabled. You can easily fix them as a visual aid, and once you are done, you should be ready for the…

CodeBitch đã đăng lại

Windows game anti-cheating systems internals: in depth analysis of Vanguard's guarded regions Excellent blog post by @Xyrem256 reversing.info/posts/guardedr… #anticheat #infosec

0xor0ne's tweet image. Windows game anti-cheating systems internals: in depth analysis of Vanguard's guarded regions
Excellent blog post by @Xyrem256 

reversing.info/posts/guardedr…

#anticheat #infosec
0xor0ne's tweet image. Windows game anti-cheating systems internals: in depth analysis of Vanguard's guarded regions
Excellent blog post by @Xyrem256 

reversing.info/posts/guardedr…

#anticheat #infosec
0xor0ne's tweet image. Windows game anti-cheating systems internals: in depth analysis of Vanguard's guarded regions
Excellent blog post by @Xyrem256 

reversing.info/posts/guardedr…

#anticheat #infosec

CodeBitch đã đăng lại

Quick preview of my ETW write-up that I did on the 'Microsoft-Windows-DotNETRuntime' Provider. Here I'm showing how certain EDR vendors are using this telemetry to build detections when .NET assemblies are reflective loaded from byte arrays.

DebugPrivilege's tweet image. Quick preview of my ETW write-up that I did on the 'Microsoft-Windows-DotNETRuntime' Provider. Here I'm showing how certain EDR vendors are using this telemetry to build detections when .NET assemblies are reflective loaded from byte arrays.

CodeBitch đã đăng lại

Understanding Windows x64 Assembly sonictk.github.io/asm_tutorial/

therealdreg's tweet image. Understanding Windows x64 Assembly sonictk.github.io/asm_tutorial/

CodeBitch đã đăng lại

I did two write-ups about ETW. The first one will cover how to capture an ETW trace and covers a case-study using the WinInet provider to analyze Cobalt Strike. The second one covers how EDR are using the DotNetRuntime ETW. 1. github.com/DebugPrivilege… 2. github.com/DebugPrivilege…


CodeBitch đã đăng lại

More Praise for "Getting Started Becoming a Master Hacker" Chosen as One of the Top 5 Cybersecurity Books of All Time AND the Top 100 Malware Books of All Time! amzn.to/3Quq4UM

three_cube's tweet image. More Praise for "Getting Started Becoming a Master Hacker"       

 Chosen as One of the Top 5 Cybersecurity Books of All Time                                          

AND         

the Top 100 Malware Books of All Time!    amzn.to/3Quq4UM

CodeBitch đã đăng lại

Delighted to share the #STRT blog on the #Darkgate malware variant that uses DLL side loading with the Windbg, an Autoit Loader, and Splunk analytics to detect (TTPs) extracted during R.E. I hope it helps! 😊 #splunk #int3 #malware #blueteam splunk.com/en_us/blog/sec…

tccontre18's tweet image. Delighted to share the  #STRT blog on the #Darkgate malware variant that uses DLL side loading with the Windbg, an Autoit Loader, and Splunk analytics to detect  (TTPs) extracted during R.E. I hope it helps! 😊 #splunk #int3 #malware #blueteam 

splunk.com/en_us/blog/sec…
tccontre18's tweet image. Delighted to share the  #STRT blog on the #Darkgate malware variant that uses DLL side loading with the Windbg, an Autoit Loader, and Splunk analytics to detect  (TTPs) extracted during R.E. I hope it helps! 😊 #splunk #int3 #malware #blueteam 

splunk.com/en_us/blog/sec…
tccontre18's tweet image. Delighted to share the  #STRT blog on the #Darkgate malware variant that uses DLL side loading with the Windbg, an Autoit Loader, and Splunk analytics to detect  (TTPs) extracted during R.E. I hope it helps! 😊 #splunk #int3 #malware #blueteam 

splunk.com/en_us/blog/sec…

CodeBitch đã đăng lại

Understanding Dirty Pagetable - m0leCon Finals 2023 CTF Writeup ptr-yudai.hatenablog.com/entry/2023/12/… #pentesting #cybersecurity #Infosec

ptracesecurity's tweet image. Understanding Dirty Pagetable - m0leCon Finals 2023 CTF Writeup ptr-yudai.hatenablog.com/entry/2023/12/… #pentesting #cybersecurity #Infosec
ptracesecurity's tweet image. Understanding Dirty Pagetable - m0leCon Finals 2023 CTF Writeup ptr-yudai.hatenablog.com/entry/2023/12/… #pentesting #cybersecurity #Infosec
ptracesecurity's tweet image. Understanding Dirty Pagetable - m0leCon Finals 2023 CTF Writeup ptr-yudai.hatenablog.com/entry/2023/12/… #pentesting #cybersecurity #Infosec
ptracesecurity's tweet image. Understanding Dirty Pagetable - m0leCon Finals 2023 CTF Writeup ptr-yudai.hatenablog.com/entry/2023/12/… #pentesting #cybersecurity #Infosec

CodeBitch đã đăng lại

🍯 Galah An LLM-powered web honeypot that uses #OpenAI to respond to arbitrary HTTP requests GET /login.php → Returns HTML/PHP + login form GET /.aws/credentials → Returns fake creds ➡️ Mimics lots of software with 1 prompt By @0x4d31 #infosec github.com/0x4D31/galah


CodeBitch đã đăng lại

RE tip of the day: Apart from parsing PEB to find its ProcessHeap structure, whose fields reveal the presence of the debugger, malware can use GetProcessHeap or RtlGetProcessHeaps APIs that return a pointer to ProcessHeap. #infosec #cybersecurity #malware #reverseengineering


CodeBitch đã đăng lại

Introduction to user space Linux rootkits with C code examples Credits @h0mbre_ buff.ly/33TK3jM #linux #rootkit

0xor0ne's tweet image. Introduction to user space Linux rootkits with C code examples
Credits @h0mbre_

buff.ly/33TK3jM

#linux #rootkit
0xor0ne's tweet image. Introduction to user space Linux rootkits with C code examples
Credits @h0mbre_

buff.ly/33TK3jM

#linux #rootkit
0xor0ne's tweet image. Introduction to user space Linux rootkits with C code examples
Credits @h0mbre_

buff.ly/33TK3jM

#linux #rootkit
0xor0ne's tweet image. Introduction to user space Linux rootkits with C code examples
Credits @h0mbre_

buff.ly/33TK3jM

#linux #rootkit

United States Xu hướng

Loading...

Something went wrong.


Something went wrong.