کانال بایت امن
4.56K subscribers
417 photos
49 videos
36 files
591 links
برگزاری دوره های آموزش برنامه نویسی و امنیت نرم افزار.

https://dword.ir
@YMahmoudnia
Download Telegram
#Article #ReverseEngineering

📗Basic SWF Bytecode Modification (AVM2/AS3)

I decided I would write up a basic SWF modification tutorial, and explain the basics of SWF modification, AoBs, ect.

🌐 Article Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering

📗Ways to Extend Trial Periods of Shareware Software

Extend Trial Periods on Software: Software’s are most essential part for any computer. Without any software PC is just useless. Normally two different restriction of software are available, one is free for life time and another is not free, hare you must require to buy license key.

🌐 Article1 - Article2

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #Security #Fuzzing #Programming

📗 Fuzzing PHP with Domato

Lately I've been working on fuzzing the PHP interpreter. I've explored many tools and techniques (AFL, LibFuzzer, even a custom fuzz engine), but most recently I decided to give Domato a try. For those not aware, Domato is a grammar-based DOM fuzzer, built to tease complex bugs out of complex code-bases.

🌐 Article Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #Security #Programming

📗 Fuzzing Go package using go-fuzz & libfuzzer

In this course, I will first select a popular Golang library and identify the most interesting methods to fuzz. Then, I’ll explains how to use go-fuzz and libfuzzer to compile the fuzzing target. Finally, I’ll show how to run the fuzzer.

🌐 Article Link

@securebyte
#Article #MalwareAnalysis

📗 Anti Analysis using API hashing

Malware authors are always using different tricks and techniques to try and stop malware analysts from analysing their malware. One common technique a malware analyst will do is take a look at the Import Address Table (IAT) once they have unpacked sample and see if the IAT gives any clues as to how the malware may behave.

🌐 Article Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #Fuzzing #Programming

📗 Fuzzing Python code using pythonfuzz

In this course, I will first select a popular Python package and find some code source example using interesting methods to fuzz. Then, I’ll explains how to create a pythonfuzz fuzzing target and how to customize it. Finally, I’ll show how to run the fuzzer and explain some particularity of pythonfuzz.

🌐 Article Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering

📗Binary Analysis Course

Analysing malware is daunting at first sight, as there are many questions but very little answers. The information security community provides information to researchers, both publicly and privately. Most reports, however, focus on the outcome of the research, rather than the process.

🌐 Article Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Misc #Github #MalwareAnalysis

📗MalwareAnalysis101

Some malware samples or suspicious files I found and their reports.

🌐 Project Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #MalwareAnalysis

📗Diving into sandbox-captured malware data

I’m sure at some point you’ve received a report or alert from some entity — US-CERT, DHS, someone on Twitter retweeting a security researcher or an anti-virus company, maybe even your bank or credit union? — about a specific threat actor and the malware they may wield against your organization’s network.

🌐 Article Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #Security

📗Advanced Persistent Threat Groups

FireEye pays special attention to advanced persistent threats (APT) groups that receive direction and support from an established nation state.

APT39 - Suspected attribution: Iran
APT35 - Suspected attribution: Iran
APT34 - Suspected attribution: Iran
APT33 - Suspected attribution: Iran
APT41 - Suspected attribution: China
APT40 - Suspected attribution: China

🌐 Link - Another Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
👍1
#Article #Exploiting #Linux #Kernel

📗 Linux Kernel Exploitation 0x1 - Smashing Stack Overflows in the Kernel

Hi folks this blog post is part of a series in which I'm running through some of the basics when it comes to kernel exploit development for Linux. I've started off the series with a walk through of how to setup your kernel for debugging and included a simple debug driver to target. The post here carries on from this point and explores some stack security paradigms in the kernel.

🌐 Article Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Github #fuzzill #Fuzzing

fuzzilli - A JavaScript Engine Fuzzer

A (coverage-)guided fuzzer for dynamic language interpreters based on a custom intermediate language ("FuzzIL") which can be mutated and translated to JavaScript.

🌐 Project Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering #WinDbg

📗 WinDbg Preview - What's New

WinDbg Preview is the latest version of WinDbg with more modern visuals, faster windows, a full-fledged scripting experience, built with the extensible debugger data model front and center. WinDbg Preview is using the same underlying engine as WinDbg today, so all the commands, extensions, and workflows you're used to will still work as they did before.

🌐 Article Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering

📗 Adaptive DLL Hijacking

DLL hijacking has been a centerpiece of our operations for many years. During that time we’ve explored the deep caveats which make this technique difficult to actually use in the real world.

🌐 Article LinkTelegram Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #Exploiting

▶️ pwn.college

pwn.college is a first-stage education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion.

ASU’s Fall 2020 CSE466 class :

Module 0: Introduction
Module 1: Program Misuse
Module 2: Shellcode
Module 3: Sandboxing
Module 4: Binary Reverse Engineering
Module 5: Memory Errors
Module 6: Exploitation
Module 7: Return Oriented Programming
Module 8: Kernel Introduction
Module 9: Dynamic Allocator Misuse
Module 10: Race Conditions
Module 11: Advanced Exploitation
Module 12: Automatic Vulnerability Discovery

🌐 Website

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #MalwareAnalysis #OSX

📗How to Reverse Malware on macOS Without Getting Infected - Part 1-3

Resources for learning malware analysis and reverse engineering abound for the Windows platform and PE files, but by comparison there’s very little literature or tutorials for those who want to learn specifically about how to reverse macOS malware and macOS malware analysis techniques.

🌐 Artcle Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #ReverseEngineering

📗 Reverse Engineering For Everyone!

Essential to the discussion of basic reverse engineering is the concept of modern malware analysis. Malware analysis is the understanding and examination of information necessary to respond to a network intrusion.

🌐 Article Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Github #Programming #Sojobo

Sojobo - A binary analysis framework

Sojobo is an emulator for the B2R2 framework. It was created to easier the analysis of potentially malicious files. It is totally developed in .NET so you don't need to install or compile any other external libraries (the project is self contained).

🌐 Project Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Github #HackBar

HackBar v2.0 releases: HackBar plugin for Burpsuite.

+Shifted to gradle from NetBeans
+Bug Fix

HackBar is a sidebar that assists you with web application security testing, it’s aim is to help make those tedious tasks a little bit easier.

🌐 Project Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_
#Article #Exploiting #linux

ROP Emporium

Learn return-oriented programming through a series of challenges designed to teach ROP techniques in isolation, with minimal reverse-engineering or bug hunting.

All challenges updated July 2020

🌐 Article Link

Telegram
Channel : @securebyte

Our Public Group : https://t.me/joinchat/8IAKs9HaoGU2NmE0
_