Smart Contract Security: The Ultimate Guide
This article serves as a mini course on smart contract security and provides an extensive list of the issues and vulnerabilities that tend to recur in Solidity smart contracts.
https://www.rareskills.io/post/smart-contract-security
#crypto #security
This article serves as a mini course on smart contract security and provides an extensive list of the issues and vulnerabilities that tend to recur in Solidity smart contracts.
https://www.rareskills.io/post/smart-contract-security
#crypto #security
RareSkills
Smart Contract Security | By RareSkills
Smart Contract Security This article serves as a mini course on smart contract security and provides an extensive list of the issues and vulnerabilities that tend to recur in Solidity smart contracts. A security issue in Solidity boils down to smart contractsβ¦
π3π₯1
Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)
https://github.com/memN0ps/bootkit-rs
#redteam #malware #bootkit #windows #rust
https://github.com/memN0ps/bootkit-rs
#redteam #malware #bootkit #windows #rust
GitHub
GitHub - memN0ps/redlotus-rs: Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus)
Rusty Bootkit - Windows UEFI Bootkit in Rust (Codename: RedLotus) - memN0ps/redlotus-rs
π₯5π1
Living Off The Land Drivers is a curated list of Windows drivers used by adversaries to bypass security controls and carry out attacks. The project helps security professionals stay informed and mitigate potential threats.
https://www.loldrivers.io/
#redteam #loldrivers #windows
https://www.loldrivers.io/
#redteam #loldrivers #windows
π€―3β€1π1
Finding and exploiting process killer drivers with LOL for 3000$
In this article, I will introduce some kernel driver/internals theory and explain how to use the data in LOLDrivers to find interesting drivers. Finally, I will present 2 examples of vulnerable drivers and explain how to quickly reverse them and create a PoC to exploit them.
https://alice.climent-pommeret.red/posts/process-killer-driver/
#redteam #loldrivers #windows
In this article, I will introduce some kernel driver/internals theory and explain how to use the data in LOLDrivers to find interesting drivers. Finally, I will present 2 examples of vulnerable drivers and explain how to quickly reverse them and create a PoC to exploit them.
https://alice.climent-pommeret.red/posts/process-killer-driver/
#redteam #loldrivers #windows
π₯4π3β€1π1
WindowsNoExec - Abusing existing instructions to executing arbitrary code without allocating executable memory
https://www.x86matthew.com/view_post?id=windows_no_exec
#windows #ctf #malware #tips
https://www.x86matthew.com/view_post?id=windows_no_exec
#windows #ctf #malware #tips
π₯6
Process Injection without R/W target memory and without creating a remote thread
https://github.com/Maff1t/InjectNtdllPOC
#windows #redteam #ctf #malware #tips
https://github.com/Maff1t/InjectNtdllPOC
#windows #redteam #ctf #malware #tips
GitHub
GitHub - Maff1t/InjectNtdllPOC: Process Injection without R/W target memory and without creating a remote thread
Process Injection without R/W target memory and without creating a remote thread - Maff1t/InjectNtdllPOC
π₯16π3
Centralized resource for listing and organizing known injection techniques and POCs
https://github.com/itaymigdal/awesome-injection
#redteam #malware #process #inject
https://github.com/itaymigdal/awesome-injection
#redteam #malware #process #inject
GitHub
GitHub - itaymigdal/awesome-injection: Centralized resource for listing and organizing known injection techniques and POCs
Centralized resource for listing and organizing known injection techniques and POCs - itaymigdal/awesome-injection
π₯8π5
Analyzing a Modern In-the-wild Android Exploit
https://googleprojectzero.blogspot.com/2023/09/analyzing-modern-in-wild-android-exploit.html
#expdev #android #linux
https://googleprojectzero.blogspot.com/2023/09/analyzing-modern-in-wild-android-exploit.html
#expdev #android #linux
projectzero.google
Analyzing a Modern In-the-wild Android Exploit - Project Zero
By Seth Jenkins, Project ZeroIntroductionIn December 2022, Googleβs Threat Analysis Group (TAG) discovered an in-the-wild exploit chain targeting Samsu...
π₯5
CVE-2023-4047 Root Cause Analysis
https://www.richardosgood.com/posts/cve---2023---4047-root-cause-analysis/
#expdev #windows #1day #winrar
https://www.richardosgood.com/posts/cve---2023---4047-root-cause-analysis/
#expdev #windows #1day #winrar
Richardosgood
CVE-2023-40477 Root Cause Analysis
Root cause analysis for CVE-2023-40477 with PoC
π₯3β€1π1
Advanced Root Detection & Bypass Techniques
In this blog, we will explore techniques related to root detection on Android devices and methods to bypass it. Our main focus will be on the strategies employed by app developers to protect their applications and prevent them from running on compromised devices.
https://8ksec.io/advanced-root-detection-bypass-techniques/
#mobile #android #reverse #frida #root #detection #bypass
In this blog, we will explore techniques related to root detection on Android devices and methods to bypass it. Our main focus will be on the strategies employed by app developers to protect their applications and prevent them from running on compromised devices.
https://8ksec.io/advanced-root-detection-bypass-techniques/
#mobile #android #reverse #frida #root #detection #bypass
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Advanced Frida Usage Part 5 β Advanced Root Detection & Bypass Techniques
Explore techniques related to root detection on Android devices and methods to bypass it.
π5β€4π1
Emulating IoT Firmware Made Easy: Start Hacking Without the Physical Device
https://boschko.ca/qemu-emulating-firmware/
#qemu #firmware
https://boschko.ca/qemu-emulating-firmware/
#qemu #firmware
Boschko Security Blog
Emulating IoT Firmware Made Easy: Start Hacking Without the Physical Device
A step-by-step how-to guide to using QEMU in Ubuntu 18.04 to emulate embedded devices.
π16π2β€1
HEVD: How a simple K-TypeConfusion took me 3 months long to create a exploit? β Windows 11 (build 22621)
https://wafzsucks.medium.com/how-a-simple-k-typeconfusion-took-me-3-months-long-to-create-a-exploit-f643c94d445f
#expdev #windows #hevd #kaslr #smep
https://wafzsucks.medium.com/how-a-simple-k-typeconfusion-took-me-3-months-long-to-create-a-exploit-f643c94d445f
#expdev #windows #hevd #kaslr #smep
Medium
How a simple K-TypeConfusion took me 3 months long to create a exploit?
Have you ever tested something for a really long time, that it made part of your life? thatβs what happen to me for the last months when aβ¦
π11β€1
Local Privilege Escalation in the glibc's ld.so (CVE-2023-4911)
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
POC: https://github.com/leesh3288/CVE-2023-4911
#expdev #linux #lpe #Alexs3y
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
POC: https://github.com/leesh3288/CVE-2023-4911
#expdev #linux #lpe #Alexs3y
GitHub
GitHub - leesh3288/CVE-2023-4911: PoC for CVE-2023-4911
PoC for CVE-2023-4911. Contribute to leesh3288/CVE-2023-4911 development by creating an account on GitHub.
π₯8π4β€1
msdocviewer is a simple tool that parses Microsoft's win32 API and driver documentation to be used within IDA.
https://github.com/alexander-hanel/msdocsviewer
#tools #idapro #windows #api
https://github.com/alexander-hanel/msdocsviewer
#tools #idapro #windows #api
π₯31β€2
PatchaPalooza uses the power of Microsoft's MSRC CVRF API to fetch, store, and analyze security update data. Designed for cybersecurity professionals, it offers a streamlined experience for those who require a quick yet detailed overview of vulnerabilities, their exploitation status, and more. This tool operates entirely offline once the data has been fetched, ensuring that your analyses can continue even without an internet connection.
https://github.com/xaitax/PatchaPalooza
https://patchapalooza.com
#expdev #helpers #tools
https://github.com/xaitax/PatchaPalooza
https://patchapalooza.com
#expdev #helpers #tools
GitHub
GitHub - xaitax/PatchaPalooza: A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.
A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates. - xaitax/PatchaPalooza
π2β€1
LdrLibraryEx a small x64 library to load dll's into memory.
https://github.com/Cracked5pider/LdrLibraryEx
#tools #redteam #dev
https://github.com/Cracked5pider/LdrLibraryEx
#tools #redteam #dev
GitHub
GitHub - Cracked5pider/LdrLibraryEx: A small x64 library to load dll's into memory.
A small x64 library to load dll's into memory. Contribute to Cracked5pider/LdrLibraryEx development by creating an account on GitHub.
π4π3β€1π₯1
Use the free Microsoft bing's gpt with ida pro, to perform free analyzes!
https://github.com/p1ay8y3ar/idaBingGPTPlugin
#tools #reverse #idapro #ai
https://github.com/p1ay8y3ar/idaBingGPTPlugin
#tools #reverse #idapro #ai
π8β€6π₯3π1
Reverse Engineering Go Binaries with Ghidra (Part 1)
https://forum.reverse4you.org/t/reverse-engineering-go-binaries-with-ghidra-part-1/20096/1
Reverse Engineering Go Binaries with Ghidra (Part 2)
https://forum.reverse4you.org/t/reverse-engineering-go-binaries-with-ghidra-part-2/20097
#reverse #ghidra #golang
https://forum.reverse4you.org/t/reverse-engineering-go-binaries-with-ghidra-part-1/20096/1
Reverse Engineering Go Binaries with Ghidra (Part 2)
https://forum.reverse4you.org/t/reverse-engineering-go-binaries-with-ghidra-part-2/20097
#reverse #ghidra #golang
R0 CREW
Reverse Engineering Go Binaries with Ghidra (Part 1)
Source: cujo.com Go (also called Golang) is an open source programming language designed by Google in 2007 and made available to the public in 2012. It gained popularity among developers over the years, but itβs not always used for good purposes. As it oftenβ¦
π₯10π6β€2
vmp-3.5.1.zip
20.2 MB
VMProtect Source Code (Leaked 07.12.2023)
mirror:
https://github.com/jmpoep/vmprotect-3.5.1
#tools #source #leaked #vmp #protector
intel.cc and processors.cc included
mirror:
https://github.com/jmpoep/vmprotect-3.5.1
#tools #source #leaked #vmp #protector
π₯48β€7π3π1
Titan is a VMProtect devirtualizer
https://github.com/archercreat/titan
#tools #reverse #devirt #devirtualizer #vmp #protector
https://github.com/archercreat/titan
#tools #reverse #devirt #devirtualizer #vmp #protector
GitHub
GitHub - archercreat/titan: Titan is a VMProtect devirtualizer
Titan is a VMProtect devirtualizer. Contribute to archercreat/titan development by creating an account on GitHub.
π₯21β€10π4π3