r0 Crew (Channel)
8.82K subscribers
35 photos
1 video
9 files
1.98K links
Security Related Links:
- Reverse Engineering;
- Malware Research;
- Exploit Development;
- Pentest;
- etc;

Join to chat: @r0crew_bot 👈

Forum: https://forum.reverse4you.org
Twitter: https://twitter.com/R0_Crew
Download Telegram
YauzaCTF 2021 is a task-based competition that will take place online on August 27-29 at 12:00 (UTC+0).

It will give the participants the atmosphere of the Soviet past.

For 48 hours, participants will be able to solve tasks of all categories:

- web, reverse, pwn, forensics, crypto, OSINT, joy.

Also new categories have been added:

- hardware, pentest and emulation!

The organizers and sponsors of the event have prepared many interesting prizes. More details on the event website.

ABOUT EVENT:

🕹 Event website: https://yauzactf.com/en
📃 CTFtime page: https://ctftime.org/event/1417/
🔑 Competition type: task-based competition
📅 Start: on August 27 at 12:00 (UTC+0)
Duration: 48 hours
👨‍👨‍👦‍👦 Number of people in the team: maximum 7 people
🥇 Qualification: students from CIS schools or universities (graduating not earlier than 2021) and those, who born not earlier than 1995

CONTACTS

☎️ For any questions talk to @drakylar

#ctf #YauzaCTF
Windows Kernel Explorer (you can simply call it as "WKE") is a free but powerful kernel research tool. It supports from Windows XP to Windows 10 (32-bit and 64-bit). Compared with WIN64AST and PCHunter, WKE can run on the latest Windows 10 without updating binary files.

https://github.com/AxtMueller/Windows-Kernel-Explorer

#tools #kernel #windows #antirootkit #darw1n
@VolgaCTF 2021 is an international inter-university cybersecurity competition with a local conference taking place in Samara, Russia on September 13-17.

Schedule of Presentations:
https://volgactf.ru/en/volgactf-2021/final/

Registration Form (free for everyone):
https://forms.yandex.ru/u/612dc0bd893f1f629d79d1e4/

#VolgaCTF #Conference #CTF
Nim implementation of Process Hollowing using syscalls (for educational purposes)

https://github.com/snovvcrash/NimHollow

#malware #redteam #processhollowing #inject #darw1n
This page was designed to be a useful, informational asset for those looking to understand the specific tactics, techniques, and procedures (TTPs) attackers are leveraging to compromise active directory and guidance to mitigation, detection, and prevention. And understand Active Directory Kill Chain Attack and Modern Post Exploitation Adversary Tradecraft Activity.

https://github.com/infosecn1nja/AD-Attack-Defense

#redteam #activedirectory #darw1n
👍1