-
I have published 2nd part of series on Windows Application Debugging - "Lab Setup Part 1" on
#scriptdotsh You can read it on Please read, comment, share.#windbg#windows#debugging#shellcoding#hacktheplanet https://lnkd.in/fBtd5yR -
@SecurityTube just finished 32bit#shellcoding , great content brother! -
During
#DEFCON Quals we discovered CPU-level errata... and then we exploited it: http://blog.ret2.io/2019/06/26/attacking-intel-tsx/ …#Intel#TSX#shellcoding pic.twitter.com/HNYCB1hR2S
-
My blog post about bind tcp shellcode for the
#slae cert - https://thehackeradventure.com/2018/05/17/assignement1/ …#infosec#shellcoding#cybersec@SecurityTube -
Here is my first part on introduction to Windows shellcoding x86. I've tried pretty hard to make it as simple as possible....Replicating a C code into ASM and finding the base pointer of DLLs :)
#ScriptDotSh#Shellcoding#Windows10 https://scriptdotsh.com/index.php/2019/03/18/windows-shellcoding-x86-hunting-kernel32-dll-part-1/ … -
That moment when your staged polymorphic encoded reverse shell shellcode works irrespective of the OS version and without even alerting the Windows 10 Defender



#Shellcoding#ASM x86 Will be writing a blogpost on this soon#ScriptDotShpic.twitter.com/ixbckBcc8n
-
So here is my second post on
#Windows#Shellcoding. Calling WINAPIs from Kernel32.dll dynamically without using LoadLibrary Calls. I've tried to make it as simple as I can. :)#ScriptDotSh#Windows10 https://scriptdotsh.com/index.php/2019/04/01/windows-shellcoding-x86-calling-functions-in-kernel32-dll-part-2/ … -
Another
#shellcoding post - this one showing how I did an analysis of some payloads generated by msfvenom: https://rastating.github.io/analysing-msfvenom-payloads/ … No pretty diagrams in this one though
#asm#x86 -
I've thrown up some shellcoding posts on my blog tonight. Including how I created a custom encoder which evades all VirusTotal checks that I creatively named Xorfuscator
It even includes a pretty diagram! Check it out: https://rastating.github.io/creating-a-custom-shellcode-encoder/ … #asm#x86#shellcoding#infosecpic.twitter.com/x66K1EGCIW
Prikaži ovu nit -
Linux x86 Bind TCP (assignement for the
#slae certification) on github: https://bit.ly/2s9ZLqb#infosec#CyberSecurity#Shellcoding@SecurityTube -
The joys of shrinking shellcode by two bytes
#backdoorman#Shellcoding#hackingpic.twitter.com/2YnxJ2rOJR
-
I was hesitant to move to
#Windbg Preview(F### Windows Store) from the older Windbg, but it looks so damn good. Using this to write my upcoming blog on x64#Shellcoding for payload development :) pic.twitter.com/AIAROtIJ96
-
Another awesome post by
@shawshank730 on Shellcoding basics#ScriptDotSh#Assembly#Shellcoding#Pentesting https://scriptdotsh.com/index.php/2018/10/26/rot2/ … -
Learn 32bit Assembly Language,
#Shellcoding, Encoders & Crypters http://bit.ly/1qSDJ3E Check out the testimonials!pic.twitter.com/PG4MctSZGT
-
Chetan Nayak (
@NinjaParanoid) is back with new blog on Windows Shellcoding at#scriptdotsh.#assembly#x86#x32dbg#shellcoding https://lnkd.in/fHcMp5S -
Assembly Language and Shellcoding on Linux « SecurityTube Training https://paper.li/lamehacker/1348215575?read=http%3A%2F%2Fwww.securitytube%2Dtraining.com%2Fonline%2Dcourses%2Fsecuritytube%2Dlinux%2Dassembly%2Dexpert%2Findex.html …
#shellcoding -
SLAE certified. Looking forward to OSCE...
#SLAE#ShellCoding#PentesterAcademypic.twitter.com/vVIQoRUUpN
-
Yesterday I spent most of my day expanding my knowledge on the
#pthyon programming language and today it is#shellcoding. All this free time from college has really given me a great opportunity to learn and grow my knowledge. -
Retro shellcoding for current threats: rebinding sockets in Windows https://www.shelliscoming.com/2019/11/retro-shellcoding-for-current-threats.html …
#ShellCoding#Windows#Malware#Infosecpic.twitter.com/CEaHFnuhhc
-
Read this super awesome and n00b-friendly post on Windows Shellcoding by my buddy Chetan Nayak (
@NinjaParanoid) on#scriptdotsh#shellcoding#x86#windbg#x32dbg#assembly https://lnkd.in/f8YqpGp
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.