Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- Tools @en:it-security:blog
- ый результат дадут свежие базы для xrumer <a href=https://www.olx.ua/d/uk/obyavlenie/progon-hrumerom-dr-50-po-ahrefs-uvelichu-reyting-domena-IDXnHrG.html>https://www.olx.ua/d/uk/obyavlenie/progon-hrumerom-dr-5... ===== The encoder is part of my shellcode tool [[https://github.com/psycore8/shencode|ShenCode]], which
- GetUserInfo( psycore8 ) @user
- r add to it. \\ \\ \\ \\ \\ ===== Stack ===== {{https://img.shields.io/badge/ISO%2027001-orange?style=f... -badge&label=certified&labelColor=black&.png?}} {{https://img.shields.io/badge/Pentester-orange?style=for... lor=black&.png?}} ===== Connect with me ===== [[https://bsky.app/profile/psycore8.bsky.social|{{https://img.shields.io/badge/Bluesky-grey?style=for-the-badge&
- Buffer Overflow im 64-Bit Stack - Teil 3 @it-security:blog
- jedem Programmneustart. Superkojiman beschreibt [[https://blog.techorganic.com|in seinem Blog]] ausführli... eses Prinzip können wir uns nun zu Nutze machen.((https://ir0nstone.gitbook.io/notes/types/stack/aslr/plt... ster/binaries/linux/x86_64/socat]] * pwntools ((https://docs.pwntools.com/en/stable/install.html)) <co... Github]] verfügbar. <file c bof-part3.c> /* Code https://blog.techorganic.com/2016/03/18/64-bit-linux-st
- Backdoor development with Code Caves @it-security:blog
- **code cave** is a series of unused bytes in a [[https://en.wikipedia.org/wiki/Process_(computing)|proce... has capacity for injecting custom instructions.((https://en.wikipedia.org/wiki/Code_cave )) ==== 2.1 Fi... r free bytes in our putty.exe. For this, we use [[https://github.com/EgeBalci/Cminer|Cminer]]: <code she... ''%%.rsrc%%'' to execute our payload: - Open [[https://ntcore.com/explorer-suite/|CFF Explorer]] - '
- Obfuscation: ByteSwapping @en:it-security:blog
- y2.asm -o poly.o </code> I do the cleanup with [[https://github.com/psycore8/shencode|ShenCode]]: <code... nd the complete shellcode here: * Shellcode: [[https://github.com/psycore8/Shellcodes/blob/main/SwapBytes/poly2.asm|poly2.asm]] * [[https://github.com/psycore8/shencode|ShenCode]] ----
- Obfuscation: ByteSwapping @it-security:blog
- poly.o </code> Das Bereinigen erledige ich mit [[https://github.com/psycore8/shencode|ShenCode]]: <code... tten Shellcode findet Ihr hier: * Shellcode: [[https://github.com/psycore8/Shellcodes/blob/main/SwapBytes/poly2.asm|poly2.asm]] * [[https://github.com/psycore8/shencode|ShenCode]] ----
- Navigation
- {page>opsec:operator:special}} </nodisp> ---- [[https://nosociety.de|#nosoc]] /* {{counter}} Besucher
- Obfuscation: polymorphic in-memory decoder @en:it-security:blog
- ecoder ===== I have taken the XOR decoder from [[https://www.doyler.net/security-not-included/shellcode-... n the decoder. I use my ShellCode tool for this [[https://github.com/psycore8/shencode|ShenCode]]: <code... I have integrated the XOR stub as a template in [[https://github.com/psycore8/shencode|ShenCode]] as a te
- Obfuscation: polymorpher In-Memory Decoder @it-security:blog
- XOR-Decoder ===== Den XOR-Decoder habe ich von [[https://www.doyler.net/security-not-included/shellcode-... zu können. Hierzu nutze ich mein ShellCode-Tool [[https://github.com/psycore8/shencode|ShenCode]]: <code... infachen, habe ich den XOR-Stub als Template in [[https://github.com/psycore8/shencode|ShenCode]] integri
- Level 1 Überschrift @playground
- hrift ==== ===== Level 2 Überschrift ===== {{gh>https://github.com/psycore8/nosoc-shellcode/blob/main/n
- Obfuscation: Shellcode als UUIDs tarnen @it-security:blog
- es in ein String-Array umzuwandeln, welches mit [[https://de.wikipedia.org/wiki/Universally_Unique_Identi... == Der Encoder ist Teil meines Shellcode-Tools [[https://github.com/psycore8/shencode|ShenCode]], welche
- Privilege escalation: Windows admin thanks to Linux @en:it-security:blog
- ribution. I have decided in favour of Lubuntu: [[https://lubuntu.me/downloads/]] After the download you
- Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
- is by passing the command to be executed to the [[https://de.wikipedia.org/wiki/C-Standard-Bibliothek|lib... tutorial is fundamentally based on the work of [[https://blog.techorganic.com|superkojiman]] ((https://blog.techorganic.com/2015/04/21/64-bit-linux-stack-smash... can be found in the link collection at the end. ((https://book.hacktricks.xyz/reversing-and-exploiting/li
- Buffer overflow in the 64-bit stack - Part 3 @en:it-security:blog
- is restarted. Superkojiman describes in detail [[https://blog.techorganic.com|in his Blog]] how to circu... t in the GOT. We can now utilise this principle.((https://ir0nstone.gitbook.io/notes/types/stack/aslr/plt... ster/binaries/linux/x86_64/socat]] * pwntools ((https://docs.pwntools.com/en/stable/install.html)) <co... in/part-3|Github]]. <file c bof-part3.c> /* Code https://blog.techorganic.com/2016/03/18/64-bit-linux-st
- Shellcode Injection Teil 1 @it-security:blog
- omit tarnen. Das machen wir mit dem Tool jigsaw ((https://github.com/RedSiege/Jigsaw)) und dem Framework ... rdatei mit jedem Vorgang anders aussehen lässt. ((https://0xpat.github.io/Malware_development_part_6/))((https://www.fo-sec.com/articles/10-defender-bypass-methods#3)) Hierzu laden wir uns [[https://github.com/fritzone/obfy|Obfy]] herunter, binde