Are you over 18 and want to see adult content?
More Annotations
![A complete backup of viewcollegeteams.com](https://www.archivebay.com/archive5/images/2af4b45b-1a21-4595-bd4d-30090247b5e4.png)
A complete backup of viewcollegeteams.com
Are you over 18 and want to see adult content?
![A complete backup of latinorecords.com](https://www.archivebay.com/archive5/images/2073597f-dcdb-4cfb-ae5f-4b3cd8dac405.png)
A complete backup of latinorecords.com
Are you over 18 and want to see adult content?
Favourite Annotations
![A complete backup of https://chospab.es](https://www.archivebay.com/archive6/images/e2249584-4282-4c0c-8f53-726e79978f06.png)
A complete backup of https://chospab.es
Are you over 18 and want to see adult content?
![A complete backup of https://elconfidencialautonomico.com](https://www.archivebay.com/archive6/images/0874f877-5e5c-4726-8cc9-d75e6f21b8fe.png)
A complete backup of https://elconfidencialautonomico.com
Are you over 18 and want to see adult content?
![A complete backup of https://slotonlineandroid.casa](https://www.archivebay.com/archive6/images/e46e45eb-53f4-4f7b-958e-bd0e1ca3c20f.png)
A complete backup of https://slotonlineandroid.casa
Are you over 18 and want to see adult content?
![A complete backup of https://americansecurityproject.org](https://www.archivebay.com/archive6/images/1fbf85fb-3098-4018-9cc8-25034f083575.png)
A complete backup of https://americansecurityproject.org
Are you over 18 and want to see adult content?
![A complete backup of https://pennfuture.org](https://www.archivebay.com/archive6/images/695a9082-801c-4a60-9b32-2124ff6b0bcf.png)
A complete backup of https://pennfuture.org
Are you over 18 and want to see adult content?
![A complete backup of https://christiepandorasbox.com](https://www.archivebay.com/archive6/images/23434386-5875-4b37-9c3b-c38d48b72af9.png)
A complete backup of https://christiepandorasbox.com
Are you over 18 and want to see adult content?
![A complete backup of https://hesa.ac.uk](https://www.archivebay.com/archive6/images/f9e93bff-5cd4-438b-88d3-9d1405a02c55.png)
A complete backup of https://hesa.ac.uk
Are you over 18 and want to see adult content?
![A complete backup of https://globalwholesalehemp.us](https://www.archivebay.com/archive6/images/71cc07f5-6a5f-43bc-9aec-505d28927ca6.png)
A complete backup of https://globalwholesalehemp.us
Are you over 18 and want to see adult content?
![A complete backup of https://qoppgestao.com.br](https://www.archivebay.com/archive6/images/081a2ccd-7ff3-4c38-92d7-93799cd6a6f9.png)
A complete backup of https://qoppgestao.com.br
Are you over 18 and want to see adult content?
![A complete backup of https://farmingsimulator19mods.com](https://www.archivebay.com/archive6/images/1f71b389-896a-40af-ba58-c142c52fd03b.png)
A complete backup of https://farmingsimulator19mods.com
Are you over 18 and want to see adult content?
![A complete backup of https://pkvgames.website](https://www.archivebay.com/archive6/images/57c3d98f-c24e-4909-9f2b-aac4063c5fbf.png)
A complete backup of https://pkvgames.website
Are you over 18 and want to see adult content?
![A complete backup of https://matome-ch.com](https://www.archivebay.com/archive6/images/6d23854d-b065-4cf9-851d-787a5005e909.png)
A complete backup of https://matome-ch.com
Are you over 18 and want to see adult content?
Text
Science.
BEST LANGUAGE FOR WRITE MALWARE n33ds0n (n33ds0n) April 5, 2021, 6:05pm #5. There is no best language for writing malware you can use any computer programming language to write malware. But most malware coder go with compile language such as C/C++ golang, C# and more but malware can also be written in scripting language like python, ruby and JavaScript infact lots of malwarePUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not) A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEMTHE HACKERS EDC BAG
The Bag. Alright, so, what’s an EDC bag without the bag part?! Personally, I don’t think you need an expensive, super high tech backpackNow, with that said, I prefer the Razer tactical pro backpack ($159.99). It’s got pockets for all your tech, and a main compartment for a laptop with room for more tech. Plus, there’s an underside compartment with a weather proof cover for the bag. HOW TO MAKE A REVERSE TCP BACKDOOR IN PYTHON In our walk in linux, there comes a point where we need to hack ( pentest ) in a safe environment. The first thing we usually do is install Virtualization Softwares and install all the distros our system can take. In stages of hacking, to compromise the victim machine, we need some sort of program to infect the system. The down-side is, AntiVirus products have signatures of favourite0X00SEC.ORG
You are being redirected.0X00SEC INIT
$ cat /home/0x00sec/partners.txt ### Partners Hackthebox - https://hackthebox.eu/ pwnDefend - https://www.pwndefend.com/ Binary Ninja - https://binary.ninja/ $ pwd0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ 0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware or 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
BEST LANGUAGE FOR WRITE MALWARE n33ds0n (n33ds0n) April 5, 2021, 6:05pm #5. There is no best language for writing malware you can use any computer programming language to write malware. But most malware coder go with compile language such as C/C++ golang, C# and more but malware can also be written in scripting language like python, ruby and JavaScript infact lots of malwarePUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not) A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEMTHE HACKERS EDC BAG
The Bag. Alright, so, what’s an EDC bag without the bag part?! Personally, I don’t think you need an expensive, super high tech backpackNow, with that said, I prefer the Razer tactical pro backpack ($159.99). It’s got pockets for all your tech, and a main compartment for a laptop with room for more tech. Plus, there’s an underside compartment with a weather proof cover for the bag. HOW TO MAKE A REVERSE TCP BACKDOOR IN PYTHON In our walk in linux, there comes a point where we need to hack ( pentest ) in a safe environment. The first thing we usually do is install Virtualization Softwares and install all the distros our system can take. In stages of hacking, to compromise the victim machine, we need some sort of program to infect the system. The down-side is, AntiVirus products have signatures of favourite0X00SEC.ORG
You are being redirected.0X00SEC INIT
$ cat /home/0x00sec/partners.txt ### Partners Hackthebox - https://hackthebox.eu/ pwnDefend - https://www.pwndefend.com/ Binary Ninja - https://binary.ninja/ $ pwd0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ 0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware orPUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not)INTRODUCING AXIOM
Introducing Axiom - The Dynamic Pwnstation Orchestrator Hello, 0x00ers! In this article, I’m going to discuss my new tool Axiom, a few of the concepts around the project, and some potential use cases. I’ve tried to build Axiom to be as extendable as possible so that power users can really use this new tool as an abstraction to use cloud computing systems into their workflows. The CHALLENGE COLLECTION: REVERSE ENGINEERING AND CRACKME Reverse Engineering and Crackme challenges. This topic is an aggregation of Crackme and reverse engineering challenges developed for 0x00sec. Please discuss the challenges in the thread they were originally posted or on IRC in #challenges. This curation is based entirely on my own whim and not a complete aggregation of all RE/Crackme challenges posted on the forum. CHALLENGES - 0X00SEC - THE HOME OF THE HACKER The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
USING URI TO POP SHELLS VIA THE DISCORD CLIENT Introduction Myself and a fellow researcher: Styx were the leads on this research and we were backed up by CyberSecStu, and 5w0rdFish from The Many Hats Club. We discovered a vulnerability within the Discord client that enabled an attacker to call local programs on a target system. We then took this flaw and used it to pivot through MS-Word macros to start a reverse TCP shell automatically PE FILE INFECTION PART II The most common way is to find the PEB of the running executable which can be found at fs:30h, then we can simply find and iterate the list of modules in the process, i.e. we can find the base addresses of kernel32.dll and ntdll.dll. From there, we simply parse the module’s file like any other PE file and iterate the exported functions table MATERIAL FOR LEARNING EXPLOIT DEVELOPMENT When I started studying and learning about exploit development, one of the biggest issues I ran in to was finding a good starting point. I am by no means an expert in this field, but here is a list of some of the material I found helpful while learning (I still am learning and will always be) to research vulnerabilities and develop exploits. I figured I would put this list out there to help THE WOLF: NOTHING IS SAFE Greetings, 0x00sec! After much discussion, the 0x00sec mods and admins have put together a new program, a Bounty Program. How it Works This very post will be a Wiki. A BRIEF INTRODUCTION TO PROXYCHAINS Hello everyone of 0x00! I figured why not make my first contribution, so heres a quick one 🍻 Today, im going to brush the topic of proxies, followed by how to set up ProxyChains to make being tracked a bit harder. So first things first. What is a proxy? In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from A SIMPLE RUNTIME CRYPTER Hey Mates, I think everyone of you has had the dream of building his own crypter; I know I have (for about a year, now). Everyone has heard of this “black magic” (as @dtm mentioned in his post). But, maybe some of you, like me, were unsuccessful in programming one. A crypter in C# is not as useful as one in C++, but that’s besides the point. C++: Complex, but handles the low-level stuff 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
BEST LANGUAGE FOR WRITE MALWARE n33ds0n (n33ds0n) April 5, 2021, 6:05pm #5. There is no best language for writing malware you can use any computer programming language to write malware. But most malware coder go with compile language such as C/C++ golang, C# and more but malware can also be written in scripting language like python, ruby and JavaScript infact lots of malwarePE FILE INFECTION
PUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not) MATERIAL FOR LEARNING EXPLOIT DEVELOPMENT When I started studying and learning about exploit development, one of the biggest issues I ran in to was finding a good starting point. I am by no means an expert in this field, but here is a list of some of the material I found helpful while learning (I still am learning and will always be) to research vulnerabilities and develop exploits. I figured I would put this list out there to helpTHE HACKERS EDC BAG
The Bag. Alright, so, what’s an EDC bag without the bag part?! Personally, I don’t think you need an expensive, super high tech backpackNow, with that said, I prefer the Razer tactical pro backpack ($159.99). It’s got pockets for all your tech, and a main compartment for a laptop with room for more tech. Plus, there’s an underside compartment with a weather proof cover for the bag. A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEM0X00SEC.ORG
You are being redirected.0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ 0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware or 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
BEST LANGUAGE FOR WRITE MALWARE n33ds0n (n33ds0n) April 5, 2021, 6:05pm #5. There is no best language for writing malware you can use any computer programming language to write malware. But most malware coder go with compile language such as C/C++ golang, C# and more but malware can also be written in scripting language like python, ruby and JavaScript infact lots of malwarePE FILE INFECTION
PUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not) MATERIAL FOR LEARNING EXPLOIT DEVELOPMENT When I started studying and learning about exploit development, one of the biggest issues I ran in to was finding a good starting point. I am by no means an expert in this field, but here is a list of some of the material I found helpful while learning (I still am learning and will always be) to research vulnerabilities and develop exploits. I figured I would put this list out there to helpTHE HACKERS EDC BAG
The Bag. Alright, so, what’s an EDC bag without the bag part?! Personally, I don’t think you need an expensive, super high tech backpackNow, with that said, I prefer the Razer tactical pro backpack ($159.99). It’s got pockets for all your tech, and a main compartment for a laptop with room for more tech. Plus, there’s an underside compartment with a weather proof cover for the bag. A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEM0X00SEC.ORG
You are being redirected.0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ 0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware orPE FILE INFECTION
The following paper documents a possible PE file infection technique which covers a high level overview and the low level code of how both the infection and the resulting payload is executed. Please note that some of the following material may not be suited for beginners as it requires: Proficiency in C/C++ Proficiency in Intel x86 assembly Knowledge of the WinAPI and its documentationPUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not) CHALLENGES - 0X00SEC - THE HOME OF THE HACKER The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
THE WOLF: NOTHING IS SAFE Greetings, 0x00sec! After much discussion, the 0x00sec mods and admins have put together a new program, a Bounty Program. How it Works This very post will be a Wiki. BUFFER OVERFLOW TO RUN ROOT SHELL Buffer Overflow Basics Overview Buffer overflows were an earth-shattering vulnerability exploited in the late 1980’s that are protected against on modern systems. That said, they are still relevant, and pave the way to learning more advanced exploits. This vulnerable program is implemented in C++. What is a buffer? Arrays allocate storage space in what is called a buffer . Syntax: type array USING URI TO POP SHELLS VIA THE DISCORD CLIENT Introduction Myself and a fellow researcher: Styx were the leads on this research and we were backed up by CyberSecStu, and 5w0rdFish from The Many Hats Club. We discovered a vulnerability within the Discord client that enabled an attacker to call local programs on a target system. We then took this flaw and used it to pivot through MS-Word macros to start a reverse TCP shell automatically A COMPLETE BEGINNER FRIENDLY GUIDE TO THE DIGISPARK BADUSB The thesis I presented for my diploma was about physical security, with BadUSB devices taking the most amount of pages. I saw there’s already a pretty good post on how to make your own BadUSB starting from a vulnerable stick (click) but I’d like to make another contribution in the same subject by presenting a complete guide on how to use a very cheap programmable microcontroller MY HACKTHEBOX CTF METHODOLOGY If your credentials are successful, you will be dropped into an interactive prompt similar to that of FTP and you’ll be able to navigate files and download files. You can also use the SMB script that comes with nmap, nmap -p445 -sV --script smb-enum-services HOW TO MAKE A REVERSE TCP BACKDOOR IN PYTHON In our walk in linux, there comes a point where we need to hack ( pentest ) in a safe environment. The first thing we usually do is install Virtualization Softwares and install all the distros our system can take. In stages of hacking, to compromise the victim machine, we need some sort of program to infect the system. The down-side is, AntiVirus products have signatures of favourite SELF-DESTRUCTING PYTHON SCRIPT Self-Destructing Python Script. Programming. python. EnergyWolf August 9, 2016, 7:37pm #1. This is short, and hopefully not completely uninteresting etc. I just wanted to be able to do this, and thought it would be pretty neat. The self-destruction of the file is achieved by it securely deleting itself. 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
PE FILE INFECTION
PUBLIC DISCORD
Hey 0x00ers! So we have discussed it and we have decided to make the 0x00sec Discord now public. You can join here 🙂 https://discord.gg/c6BHVfn Looking forward to chatting with all ofyou!
THE HACKERS EDC BAG
The Bag. Alright, so, what’s an EDC bag without the bag part?! Personally, I don’t think you need an expensive, super high tech backpackNow, with that said, I prefer the Razer tactical pro backpack ($159.99). It’s got pockets for all your tech, and a main compartment for a laptop with room for more tech. Plus, there’s an underside compartment with a weather proof cover for the bag. A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEM METASPLOITABLE 2 HOW-TO Metasploitable 2 - IRC Backdoor The first tutorial on Metasploitable 2 was about the vsftp backdoor, in this post we will talk about the IRC Backdoor. In the first part of this “How to” we will run the Metasploit exploit ( The skid way ). The second part we will write our own python exploit to trigger the backdoor #The Metasploit way The first thing we need to do is a scan of the machine0X00SEC INIT
$ cat /home/0x00sec/partners.txt ### Partners Hackthebox - https://hackthebox.eu/ pwnDefend - https://www.pwndefend.com/ Binary Ninja - https://binary.ninja/ $ pwd0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ ERROR : VOLATILITY.DEBUG : THE REQUESTED FILE DOESN'T This topic was automatically closed after 30 days. New replies are nolonger allowed.
0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware or 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
PE FILE INFECTION
PUBLIC DISCORD
Hey 0x00ers! So we have discussed it and we have decided to make the 0x00sec Discord now public. You can join here 🙂 https://discord.gg/c6BHVfn Looking forward to chatting with all ofyou!
THE HACKERS EDC BAG
The Bag. Alright, so, what’s an EDC bag without the bag part?! Personally, I don’t think you need an expensive, super high tech backpackNow, with that said, I prefer the Razer tactical pro backpack ($159.99). It’s got pockets for all your tech, and a main compartment for a laptop with room for more tech. Plus, there’s an underside compartment with a weather proof cover for the bag. A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEM METASPLOITABLE 2 HOW-TO Metasploitable 2 - IRC Backdoor The first tutorial on Metasploitable 2 was about the vsftp backdoor, in this post we will talk about the IRC Backdoor. In the first part of this “How to” we will run the Metasploit exploit ( The skid way ). The second part we will write our own python exploit to trigger the backdoor #The Metasploit way The first thing we need to do is a scan of the machine0X00SEC INIT
$ cat /home/0x00sec/partners.txt ### Partners Hackthebox - https://hackthebox.eu/ pwnDefend - https://www.pwndefend.com/ Binary Ninja - https://binary.ninja/ $ pwd0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ ERROR : VOLATILITY.DEBUG : THE REQUESTED FILE DOESN'T This topic was automatically closed after 30 days. New replies are nolonger allowed.
0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware or REVERSE ENGINEERING 101 Continuing the discussion from Cracking Your First Program: As requested by @pry0cc, this is a crash course on reverse engineering. Before reading this, you should try to solve @dtm challenge: If you didn’t manage or you want to see somebody else solution keep reading. Our Target I will start writing our target program. You can try what is described in this paper against CHALLENGES - 0X00SEC - THE HOME OF THE HACKER CrackMe Challenge - Introduction / Very Easy Password Mechanism (Python) 27: 15572: September 19, 2019 CrackMe Challenge - Hardcoded Password (C#)PUBLIC DISCORD
Hey 0x00ers! So we have discussed it and we have decided to make the 0x00sec Discord now public. You can join here 🙂 https://discord.gg/c6BHVfn Looking forward to chatting with all ofyou!
REVERSINGHERO: LEARN REVERSE ENGINEERING (X64) Hi, I just finished creating the first iteration of ReversingHero challenge. It can be found here: https://www.reversinghero.com ReversingHero a reverse engineering self learning kit (x86_64) wrapped inside one binary file. It is made of about 15 levels, with difficulty gradually increasing. There are no specific rules for solving the levels: everything is allowed. There is also a set of BEST LANGUAGE FOR WRITE MALWARE for me i was malware author from 4 years ago and for today i test c# ,python and c++ . the easiest language of course c# . but the better language of course c++ it gives you low level than c# . A COMPLETE BEGINNER FRIENDLY GUIDE TO THE DIGISPARK BADUSB The thesis I presented for my diploma was about physical security, with BadUSB devices taking the most amount of pages. I saw there’s already a pretty good post on how to make your own BadUSB starting from a vulnerable stick (click) but I’d like to make another contribution in the same subject by presenting a complete guide on how to use a very cheap programmable microcontroller THE WOLF: NOTHING IS SAFE Greetings, 0x00sec! After much discussion, the 0x00sec mods and admins have put together a new program, a Bounty Program. How it Works This very post will be a Wiki. USING URI TO POP SHELLS VIA THE DISCORD CLIENT Introduction Myself and a fellow researcher: Styx were the leads on this research and we were backed up by CyberSecStu, and 5w0rdFish from The Many Hats Club. We discovered a vulnerability within the Discord client that enabled an attacker to call local programs on a target system. We then took this flaw and used it to pivot through MS-Word macros to start a reverse TCP shell automatically MATERIAL FOR LEARNING EXPLOIT DEVELOPMENT When I started studying and learning about exploit development, one of the biggest issues I ran in to was finding a good starting point. I am by no means an expert in this field, but here is a list of some of the material I found helpful while learning (I still am learning and will always be) to research vulnerabilities and develop exploits. I figured I would put this list out there to help CONFUSED ABOUT MALWARE DEVELOPMENT Hi folks I been confused lately about malware development, I am familiar with python and use it for web development however I know that it’s not the right language for malware development. The reason that I picked python at first place was because I was told “It’s a general purpose programming language & you can do anything with it”. The moment I became an intermediate programmer, I 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
PUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not)PE FILE INFECTION
A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEM METASPLOITABLE 2 HOW-TO Metasploitable 2 - IRC Backdoor The first tutorial on Metasploitable 2 was about the vsftp backdoor, in this post we will talk about the IRC Backdoor. In the first part of this “How to” we will run the Metasploit exploit ( The skid way ). The second part we will write our own python exploit to trigger the backdoor #The Metasploit way The first thing we need to do is a scan of the machineTHE HACKERS EDC BAG
The Bag. Alright, so, what’s an EDC bag without the bag part?! Personally, I don’t think you need an expensive, super high tech backpackNow, with that said, I prefer the Razer tactical pro backpack ($159.99). It’s got pockets for all your tech, and a main compartment for a laptop with room for more tech. Plus, there’s an underside compartment with a weather proof cover for the bag.0X00SEC INIT
$ cat /home/0x00sec/partners.txt ### Partners Hackthebox - https://hackthebox.eu/ pwnDefend - https://www.pwndefend.com/ Binary Ninja - https://binary.ninja/ $ pwd0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ SELF-DESTRUCTING PYTHON SCRIPT Self-Destructing Python Script. Programming. python. EnergyWolf August 9, 2016, 7:37pm #1. This is short, and hopefully not completely uninteresting etc. I just wanted to be able to do this, and thought it would be pretty neat. The self-destruction of the file is achieved by it securely deleting itself. 0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware or 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
PUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not)PE FILE INFECTION
A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEM METASPLOITABLE 2 HOW-TO Metasploitable 2 - IRC Backdoor The first tutorial on Metasploitable 2 was about the vsftp backdoor, in this post we will talk about the IRC Backdoor. In the first part of this “How to” we will run the Metasploit exploit ( The skid way ). The second part we will write our own python exploit to trigger the backdoor #The Metasploit way The first thing we need to do is a scan of the machineTHE HACKERS EDC BAG
The Bag. Alright, so, what’s an EDC bag without the bag part?! Personally, I don’t think you need an expensive, super high tech backpackNow, with that said, I prefer the Razer tactical pro backpack ($159.99). It’s got pockets for all your tech, and a main compartment for a laptop with room for more tech. Plus, there’s an underside compartment with a weather proof cover for the bag.0X00SEC INIT
$ cat /home/0x00sec/partners.txt ### Partners Hackthebox - https://hackthebox.eu/ pwnDefend - https://www.pwndefend.com/ Binary Ninja - https://binary.ninja/ $ pwd0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ SELF-DESTRUCTING PYTHON SCRIPT Self-Destructing Python Script. Programming. python. EnergyWolf August 9, 2016, 7:37pm #1. This is short, and hopefully not completely uninteresting etc. I just wanted to be able to do this, and thought it would be pretty neat. The self-destruction of the file is achieved by it securely deleting itself. 0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware or REVERSE ENGINEERING 101 Continuing the discussion from Cracking Your First Program: As requested by @pry0cc, this is a crash course on reverse engineering. Before reading this, you should try to solve @dtm challenge: If you didn’t manage or you want to see somebody else solution keep reading. Our Target I will start writing our target program. You can try what is described in this paper againstPUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not) BEST LANGUAGE FOR WRITE MALWARE n33ds0n (n33ds0n) April 5, 2021, 6:05pm #5. There is no best language for writing malware you can use any computer programming language to write malware. But most malware coder go with compile language such as C/C++ golang, C# and more but malware can also be written in scripting language like python, ruby and JavaScript infact lots of malware CHALLENGES - 0X00SEC - THE HOME OF THE HACKER The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
REVERSINGHERO: LEARN REVERSE ENGINEERING (X64) Hi, I just finished creating the first iteration of ReversingHero challenge. It can be found here: https://www.reversinghero.com ReversingHero a reverse engineering self learning kit (x86_64) wrapped inside one binary file. It is made of about 15 levels, with difficulty gradually increasing. There are no specific rules for solving the levels: everything is allowed. There is also a set of A COMPLETE BEGINNER FRIENDLY GUIDE TO THE DIGISPARK BADUSB The thesis I presented for my diploma was about physical security, with BadUSB devices taking the most amount of pages. I saw there’s already a pretty good post on how to make your own BadUSB starting from a vulnerable stick (click) but I’d like to make another contribution in the same subject by presenting a complete guide on how to use a very cheap programmable microcontroller MY HACKTHEBOX CTF METHODOLOGY If your credentials are successful, you will be dropped into an interactive prompt similar to that of FTP and you’ll be able to navigate files and download files. You can also use the SMB script that comes with nmap, nmap -p445 -sV --script smb-enum-services MATERIAL FOR LEARNING EXPLOIT DEVELOPMENT When I started studying and learning about exploit development, one of the biggest issues I ran in to was finding a good starting point. I am by no means an expert in this field, but here is a list of some of the material I found helpful while learning (I still am learning and will always be) to research vulnerabilities and develop exploits. I figured I would put this list out there to help USING URI TO POP SHELLS VIA THE DISCORD CLIENT Introduction Myself and a fellow researcher: Styx were the leads on this research and we were backed up by CyberSecStu, and 5w0rdFish from The Many Hats Club. We discovered a vulnerability within the Discord client that enabled an attacker to call local programs on a target system. We then took this flaw and used it to pivot through MS-Word macros to start a reverse TCP shell automatically CONFUSED ABOUT MALWARE DEVELOPMENT Hi folks I been confused lately about malware development, I am familiar with python and use it for web development however I know that it’s not the right language for malware development. The reason that I picked python at first place was because I was told “It’s a general purpose programming language & you can do anything with it”. The moment I became an intermediate programmer, I 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
PUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not)PE FILE INFECTION
A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEM METASPLOITABLE 2 HOW-TO Metasploitable 2 - IRC Backdoor The first tutorial on Metasploitable 2 was about the vsftp backdoor, in this post we will talk about the IRC Backdoor. In the first part of this “How to” we will run the Metasploit exploit ( The skid way ). The second part we will write our own python exploit to trigger the backdoor #The Metasploit way The first thing we need to do is a scan of the machineTHE HACKERS EDC BAG
The Bag. Alright, so, what’s an EDC bag without the bag part?! Personally, I don’t think you need an expensive, super high tech backpackNow, with that said, I prefer the Razer tactical pro backpack ($159.99). It’s got pockets for all your tech, and a main compartment for a laptop with room for more tech. Plus, there’s an underside compartment with a weather proof cover for the bag.0X00SEC INIT
$ cat /home/0x00sec/partners.txt ### Partners Hackthebox - https://hackthebox.eu/ pwnDefend - https://www.pwndefend.com/ Binary Ninja - https://binary.ninja/ $ pwd0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ SELF-DESTRUCTING PYTHON SCRIPT Self-Destructing Python Script. Programming. python. EnergyWolf August 9, 2016, 7:37pm #1. This is short, and hopefully not completely uninteresting etc. I just wanted to be able to do this, and thought it would be pretty neat. The self-destruction of the file is achieved by it securely deleting itself. 0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware or 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
PUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not)PE FILE INFECTION
A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEM METASPLOITABLE 2 HOW-TO Metasploitable 2 - IRC Backdoor The first tutorial on Metasploitable 2 was about the vsftp backdoor, in this post we will talk about the IRC Backdoor. In the first part of this “How to” we will run the Metasploit exploit ( The skid way ). The second part we will write our own python exploit to trigger the backdoor #The Metasploit way The first thing we need to do is a scan of the machineTHE HACKERS EDC BAG
The Bag. Alright, so, what’s an EDC bag without the bag part?! Personally, I don’t think you need an expensive, super high tech backpackNow, with that said, I prefer the Razer tactical pro backpack ($159.99). It’s got pockets for all your tech, and a main compartment for a laptop with room for more tech. Plus, there’s an underside compartment with a weather proof cover for the bag.0X00SEC INIT
$ cat /home/0x00sec/partners.txt ### Partners Hackthebox - https://hackthebox.eu/ pwnDefend - https://www.pwndefend.com/ Binary Ninja - https://binary.ninja/ $ pwd0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ SELF-DESTRUCTING PYTHON SCRIPT Self-Destructing Python Script. Programming. python. EnergyWolf August 9, 2016, 7:37pm #1. This is short, and hopefully not completely uninteresting etc. I just wanted to be able to do this, and thought it would be pretty neat. The self-destruction of the file is achieved by it securely deleting itself. 0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware or REVERSE ENGINEERING 101 Continuing the discussion from Cracking Your First Program: As requested by @pry0cc, this is a crash course on reverse engineering. Before reading this, you should try to solve @dtm challenge: If you didn’t manage or you want to see somebody else solution keep reading. Our Target I will start writing our target program. You can try what is described in this paper againstPUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not) BEST LANGUAGE FOR WRITE MALWARE n33ds0n (n33ds0n) April 5, 2021, 6:05pm #5. There is no best language for writing malware you can use any computer programming language to write malware. But most malware coder go with compile language such as C/C++ golang, C# and more but malware can also be written in scripting language like python, ruby and JavaScript infact lots of malware CHALLENGES - 0X00SEC - THE HOME OF THE HACKER The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
REVERSINGHERO: LEARN REVERSE ENGINEERING (X64) Hi, I just finished creating the first iteration of ReversingHero challenge. It can be found here: https://www.reversinghero.com ReversingHero a reverse engineering self learning kit (x86_64) wrapped inside one binary file. It is made of about 15 levels, with difficulty gradually increasing. There are no specific rules for solving the levels: everything is allowed. There is also a set of A COMPLETE BEGINNER FRIENDLY GUIDE TO THE DIGISPARK BADUSB The thesis I presented for my diploma was about physical security, with BadUSB devices taking the most amount of pages. I saw there’s already a pretty good post on how to make your own BadUSB starting from a vulnerable stick (click) but I’d like to make another contribution in the same subject by presenting a complete guide on how to use a very cheap programmable microcontroller MY HACKTHEBOX CTF METHODOLOGY If your credentials are successful, you will be dropped into an interactive prompt similar to that of FTP and you’ll be able to navigate files and download files. You can also use the SMB script that comes with nmap, nmap -p445 -sV --script smb-enum-services MATERIAL FOR LEARNING EXPLOIT DEVELOPMENT When I started studying and learning about exploit development, one of the biggest issues I ran in to was finding a good starting point. I am by no means an expert in this field, but here is a list of some of the material I found helpful while learning (I still am learning and will always be) to research vulnerabilities and develop exploits. I figured I would put this list out there to help USING URI TO POP SHELLS VIA THE DISCORD CLIENT Introduction Myself and a fellow researcher: Styx were the leads on this research and we were backed up by CyberSecStu, and 5w0rdFish from The Many Hats Club. We discovered a vulnerability within the Discord client that enabled an attacker to call local programs on a target system. We then took this flaw and used it to pivot through MS-Word macros to start a reverse TCP shell automatically CONFUSED ABOUT MALWARE DEVELOPMENT Hi folks I been confused lately about malware development, I am familiar with python and use it for web development however I know that it’s not the right language for malware development. The reason that I picked python at first place was because I was told “It’s a general purpose programming language & you can do anything with it”. The moment I became an intermediate programmer, I 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
BEST LANGUAGE FOR WRITE MALWARE n33ds0n (n33ds0n) April 5, 2021, 6:05pm #5. There is no best language for writing malware you can use any computer programming language to write malware. But most malware coder go with compile language such as C/C++ golang, C# and more but malware can also be written in scripting language like python, ruby and JavaScript infact lots of malwarePUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not)PE FILE INFECTION
A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEM PE FILE INFECTION PART II The most common way is to find the PEB of the running executable which can be found at fs:30h, then we can simply find and iterate the list of modules in the process, i.e. we can find the base addresses of kernel32.dll and ntdll.dll. From there, we simply parse the module’s file like any other PE file and iterate the exported functions table0X00SEC INIT
$ cat /home/0x00sec/partners.txt ### Partners Hackthebox - https://hackthebox.eu/ pwnDefend - https://www.pwndefend.com/ Binary Ninja - https://binary.ninja/ $ pwd0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ ERROR : VOLATILITY.DEBUG : THE REQUESTED FILE DOESN'T This topic was automatically closed after 30 days. New replies are nolonger allowed.
0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware or 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
BEST LANGUAGE FOR WRITE MALWARE n33ds0n (n33ds0n) April 5, 2021, 6:05pm #5. There is no best language for writing malware you can use any computer programming language to write malware. But most malware coder go with compile language such as C/C++ golang, C# and more but malware can also be written in scripting language like python, ruby and JavaScript infact lots of malwarePUBLIC DISCORD
pry0cc (Leader & Offsec Engineer & Forum Daddy) pinned globally September 3, 2019, 8:42pm #2. BL4CKH47H4CK3R September 3, 2019, 9:26pm #3. If possible open a Telegram Chatting Group. Because most of the people like us are now using Telegram. Confused about https://t (dot) me/ir0x00sec (Official/Not)PE FILE INFECTION
A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEM PE FILE INFECTION PART II The most common way is to find the PEB of the running executable which can be found at fs:30h, then we can simply find and iterate the list of modules in the process, i.e. we can find the base addresses of kernel32.dll and ntdll.dll. From there, we simply parse the module’s file like any other PE file and iterate the exported functions table0X00SEC INIT
$ cat /home/0x00sec/partners.txt ### Partners Hackthebox - https://hackthebox.eu/ pwnDefend - https://www.pwndefend.com/ Binary Ninja - https://binary.ninja/ $ pwd0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ ERROR : VOLATILITY.DEBUG : THE REQUESTED FILE DOESN'T This topic was automatically closed after 30 days. New replies are nolonger allowed.
0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware or 0X00SEC - THE HOME OF THE HACKER hacking. 2. 1926. April 6, 2021. Threat Hunting and Mitigation in *Nix/macOS Environments. (Please comment and tell me what I'm missing. This is initial work) Linux. linux , hacking , malware. REFLECTIVE DLL INJECTION Reflective DLL Injection Process. Here is a brief summary of the stages that will be undergone to map a DLL into an external process: The DLL payload must be retrieved, The DLL must then be mapped into memory, After mapping it to memory, its import table must be rebuilt, The base relocation table must be parsed to fix addresses due to the BEST LANGUAGE FOR WRITE MALWARE n33ds0n (n33ds0n) April 5, 2021, 6:05pm #5. There is no best language for writing malware you can use any computer programming language to write malware. But most malware coder go with compile language such as C/C++ golang, C# and more but malware can also be written in scripting language like python, ruby and JavaScript infact lots of malware THE WOLF: NOTHING IS SAFE Greetings, 0x00sec! After much discussion, the 0x00sec mods and admins have put together a new program, a Bounty Program. How it Works This very post will be a Wiki. MY HACKTHEBOX CTF METHODOLOGY If your credentials are successful, you will be dropped into an interactive prompt similar to that of FTP and you’ll be able to navigate files and download files. You can also use the SMB script that comes with nmap, nmap -p445 -sV --script smb-enum-services A COMPLETE BEGINNER FRIENDLY GUIDE TO THE DIGISPARK BADUSB The thesis I presented for my diploma was about physical security, with BadUSB devices taking the most amount of pages. I saw there’s already a pretty good post on how to make your own BadUSB starting from a vulnerable stick (click) but I’d like to make another contribution in the same subject by presenting a complete guide on how to use a very cheap programmable microcontroller HOW TO MAKE A REVERSE TCP BACKDOOR IN PYTHON In our walk in linux, there comes a point where we need to hack ( pentest ) in a safe environment. The first thing we usually do is install Virtualization Softwares and install all the distros our system can take. In stages of hacking, to compromise the victim machine, we need some sort of program to infect the system. The down-side is, AntiVirus products have signatures of favourite USING URI TO POP SHELLS VIA THE DISCORD CLIENT Introduction Myself and a fellow researcher: Styx were the leads on this research and we were backed up by CyberSecStu, and 5w0rdFish from The Many Hats Club. We discovered a vulnerability within the Discord client that enabled an attacker to call local programs on a target system. We then took this flaw and used it to pivot through MS-Word macros to start a reverse TCP shell automaticallyTHE HACKERS EDC BAG
The Bag. Alright, so, what’s an EDC bag without the bag part?! Personally, I don’t think you need an expensive, super high tech backpackNow, with that said, I prefer the Razer tactical pro backpack ($159.99). It’s got pockets for all your tech, and a main compartment for a laptop with room for more tech. Plus, there’s an underside compartment with a weather proof cover for the bag. SELF-DESTRUCTING PYTHON SCRIPT Self-Destructing Python Script. Programming. python. EnergyWolf August 9, 2016, 7:37pm #1. This is short, and hopefully not completely uninteresting etc. I just wanted to be able to do this, and thought it would be pretty neat. The self-destruction of the file is achieved by it securely deleting itself. 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
PE FILE INFECTION
A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEMPUBLIC DISCORD
Hey 0x00ers! So we have discussed it and we have decided to make the 0x00sec Discord now public. You can join here 🙂 https://discord.gg/c6BHVfn Looking forward to chatting with all ofyou!
BEST LANGUAGE FOR WRITE MALWARE for me i was malware author from 4 years ago and for today i test c# ,python and c++ . the easiest language of course c# . but the better language of course c++ it gives you low level than c# . PE FILE INFECTION PART II Introduction It has been more than a year since I published the concept of infecting an executable with shellcode here and recently I have been motivated to develop another PoC which follows the same path but at a more advanced level combining knowledge and techniques that I have learned since then. In this paper, I will be documenting a file “binding” method - I say “binding” because0X00SEC INIT
$ cat /home/0x00sec/partners.txt ### Partners Hackthebox - https://hackthebox.eu/ pwnDefend - https://www.pwndefend.com/ Binary Ninja - https://binary.ninja/ $ pwd0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ ERROR : VOLATILITY.DEBUG : THE REQUESTED FILE DOESN'T This topic was automatically closed after 30 days. New replies are nolonger allowed.
0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware or 0X00SEC - THE HOME OF THE HACKERELFPARTNERSSOCIALPIRATING ILLEGALLYHACKTHEBOX MACHINES FOR BEGINNERS The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
PE FILE INFECTION
A BLUE TEAM GUIDE TO AZURE & OFFICE 365 MONITORING A few weeks ago I thought that 0x00sec didn’t have enough Blue Team focused posts. Yet, detection of potential threats is incredibly important in any organization. Because Azure and Office 365 are widely used, I decided to start with this. I hope you will find it useful because unfortunately, there is a lack of good resources other than Microsoft when it comes to monitoring Azure with a SIEMPUBLIC DISCORD
Hey 0x00ers! So we have discussed it and we have decided to make the 0x00sec Discord now public. You can join here 🙂 https://discord.gg/c6BHVfn Looking forward to chatting with all ofyou!
BEST LANGUAGE FOR WRITE MALWARE for me i was malware author from 4 years ago and for today i test c# ,python and c++ . the easiest language of course c# . but the better language of course c++ it gives you low level than c# . PE FILE INFECTION PART II Introduction It has been more than a year since I published the concept of infecting an executable with shellcode here and recently I have been motivated to develop another PoC which follows the same path but at a more advanced level combining knowledge and techniques that I have learned since then. In this paper, I will be documenting a file “binding” method - I say “binding” because0X00SEC INIT
$ cat /home/0x00sec/partners.txt ### Partners Hackthebox - https://hackthebox.eu/ pwnDefend - https://www.pwndefend.com/ Binary Ninja - https://binary.ninja/ $ pwd0X00SEC INIT
$ pwd /home/0x00sec/ $ ls forum.txt partners.txt $ ERROR : VOLATILITY.DEBUG : THE REQUESTED FILE DOESN'T This topic was automatically closed after 30 days. New replies are nolonger allowed.
0X00SEC - THE HOME OF THE HACKER - LATEST TOPICS Like on windows there are exe (compiled from python, C or C++ assembly), VBS, bat extensions to name a few that can be dangerous. But if Linux malware was to be made that could spread or do damage what would be its source extension? and this very question is why Linux has little malware or 0X00SEC - THE HOME OF THE HACKER The Home of the Hacker - Malware, Reverse Engineering, and ComputerScience.
REFLECTIVE DLL INJECTION Demonstration. In this demonstration, I will be using putty.exe because I can and I can’t use explorer.exe because it is a 64-bit process versus my 32-bit injector and DLL. Also, I don’t have a 32-bit VM anywhere. I will also be using the Process Hacker monitoring tool to view any forensic evidence as a result of the DLL injection.. Normal DLL Injection BEST LANGUAGE FOR WRITE MALWARE for me i was malware author from 4 years ago and for today i test c# ,python and c++ . the easiest language of course c# . but the better language of course c++ it gives you low level than c# . MY HACKTHEBOX CTF METHODOLOGY Hey 0x00ers! I’m so sorry that it’s been such a long time since I’ve dropped an article here! I’ve been writing for my current company navisec.io @ delta.navisec.io and I’ve not had the chance to drop a good article for 0x00sec for a little while. Today that is changing! Whoop! In this article I’m going to discuss CTF methodology, really, this links in so closely to real life THE WOLF: NOTHING IS SAFE Greetings, 0x00sec! After much discussion, the 0x00sec mods and admins have put together a new program, a Bounty Program. How it Works This very post will be a Wiki. A COMPLETE BEGINNER FRIENDLY GUIDE TO THE DIGISPARK BADUSB The thesis I presented for my diploma was about physical security, with BadUSB devices taking the most amount of pages. I saw there’s already a pretty good post on how to make your own BadUSB starting from a vulnerable stick (click) but I’d like to make another contribution in the same subject by presenting a complete guide on how to use a very cheap programmable microcontroller HOW TO MAKE A REVERSE TCP BACKDOOR IN PYTHON In our walk in linux, there comes a point where we need to hack ( pentest ) in a safe environment. The first thing we usually do is install Virtualization Softwares and install all the distros our system can take. In stages of hacking, to compromise the victim machine, we need some sort of program to infect the system. The down-side is, AntiVirus products have signatures of favouriteTHE HACKERS EDC BAG
The Bag. Alright, so, what’s an EDC bag without the bag part?! Personally, I don’t think you need an expensive, super high tech backpackNow, with that said, I prefer the Razer tactical pro backpack ($159.99). It’s got pockets for all your tech, and a main compartment for a laptop with room for more tech. Plus, there’s an underside compartment with a weather proof cover for the bag. USING URI TO POP SHELLS VIA THE DISCORD CLIENT Introduction Myself and a fellow researcher: Styx were the leads on this research and we were backed up by CyberSecStu, and 5w0rdFish from The Many Hats Club. We discovered a vulnerability within the Discord client that enabled an attacker to call local programs on a target system. We then took this flaw and used it to pivot through MS-Word macros to start a reverse TCP shell automatically SELF-DESTRUCTING PYTHON SCRIPT This is short, and hopefully not completely uninteresting etc. I just wanted to be able to do this, and thought it would be pretty neat. Theself-destruction of
Init Partners
Sign UpLog In
*
*
*
all categories
*
all tags
* Latest
* Top
* Categories
*
TOPIC
REPLIES
VIEWS
ACTIVITY
TOR, a WAF and luck?Web Hacking
sql vpn blueteam torlinux
1
48
43m
CSCG 2020 reversing intro challenges writeup (easy level)Challenges
beginner reverseengineering8
315
44m
Double URL-encoded XSSBug Bounty
xss
2
219
9h
Sources for a Good Amount of Programming LanguagesProgramming
19
9.0k
12h
Pwned email passwordQuestions
0
195
1d
Tricks of the Trade from 5+ years in Offensive Cyber SecurityPentesting
vagrant docker osint trickszsh
25
22.4k
1d
+ A call to all users and staffSocial
3
573
3d
Using WASI(Web Assembly System Interface) to call MessageBoxAProgramming
1
347
4d
Passrelevator websideQuestions
malware
1
260
5d
How to track phone
Questions
hacking
3
1.0k
7d
PE-File Reader
Programming
2
489
8d
Insecure File Upload VulnerabilityWeb Hacking
hacking
3
876
8d
How get gmail accountQuestions
hacking
6
1.4k
8d
Personal Tale and the Road to Malware Development, ResourcesMalware
resources script programminghacking
5
2.3k
8d
A little help regarding new CTFQuestions
ctf
3
509
10d
Linux Without Root
Linux
13
12.2k
12d
Where can I find vulnerable code snnipets to practice vulnerabilityresearch skills?
Questions
7
3.4k
16d
How to make a Persistence backdoor in windows Box?Questions
hacking programming1
805
19d
Antivirus Behaviour DetectionQuestions
python hacking programming4
1.1k
19d
Commando VM for Pentesting With WindowsPentesting
17
12.1k
19d
SS7 network part 1
Networking
12
3.8k
19d
New guy, total noob asking for helpQuestions
3
1.0k
20d
What are y’all’s opinions on programming books?Social
programming
14
2.8k
21d
Spy Android app developmentBeginner Guides
learn programming
3
1.6k
21d
Open Redirection GuideBug Bounty
11
1.7k
21d
How NOT to Write a Security BlogInspiration
programming
8
5.2k
25d
AnalyzeMe No1
Malware
challenge
6
3.3k
25d
HTS.org R10 challengeWeb Hacking
challenge webhacking tutorialforgery
4
4.2k
26d
Exploit Development - The Magic in HackingExploit Development
hacking reverseengineeringlinux
5
10.9k
29d
Writeup: 0x00sec CTF - Exercise #6CTF
0
1.0k
May 4
ARM Crackme - Starting with EORChallenges
reverseengineering challenge4
4.7k
May 4
Null Terminated Programming 101 - x64Exploit Development
shellcode assembly linux3
5.0k
May 3
Maintain Session HijackingRed-Team
5
1.6k
May 3
Learn Botnets, Rootkits and KeyloggersBeginner Guides
7
3.4k
May 2
Decompile EX4 File
Challenges
hacking
3
1.4k
May 2
Useful things I tend to forget to do when playing HTBHackthebox Writeups
8
1.8k
May 1
Any good resource about installing kali offensive tools on ubuntu?Questions
3
1.4k
May 1
Master of RATs - How to create your own TrackerMalware
csharp tracking malware python reverseengineering3
5.5k
May 1
(VulnHub) WriteUp — WalkthroughCTF
ctf writeup hacking0
850
Apr 28
Writeup: 0x00sec CTF - Exercise #5CTF
2
1.5k
Apr 28
HackTheBox Writeup: ControlHackthebox Writeups
1
1.1k
Apr 28
Into the wild: Gaining access to SS7 - Part 1: Finding an accesspoint
Networking
tutorial hacking
12
18.1k
Apr 26
The basics to master the skill of ethical hacking?Social
3
1.5k
Apr 23
Linux Root Password Keylogger: Help neededQuestions
keylogger malware python1
1.5k
Apr 23
Wifipumpkin3 tool
Programming
linux networking
5
1.6k
Apr 22
Random Thoughts After Nearly 9 years Pentesting/Red Teaming: 2019Pentesting
hacking
18
21.5k
Apr 19
LARRYCHATTER - PoC HAMMERTOSS - C2 over TwitterMalware
malware
2
1.3k
Apr 19
Life Update Regarding To My Last Post From A Couple Of Months AgoSocial
6
3.1k
Apr 18
Why you should learn AnsibleLinux
ctf challenge servershacking linux
7
2.2k
Apr 18
Suggestions for things to try on web app pentest exercise with limited avenues for attack?Web Hacking
9
2.8k
Apr 17
Excel | Primi passi
Malware
macros malware excel5
1.5k
Apr 17
Taking SQL Injections further (Blind Second Order SQL Injection + TMHC CTF Shitter Writeup)Web Hacking
database webhacking sqlihacking
3
8.0k
Apr 15
OverTheWire Narnia challenges 0-4 Writeups (Binary exploitation basics with explanations)Exploit Development
ctf exploit bufferoverflowbinary
2
4.6k
Apr 15
IP address compromisedQuestions
4
1.8k
Apr 15
Is there a way to un-obfuscate intentionally hidden text on websites?Questions
webhacking programming reverseengineering hacking1
996
Apr 13
My first attempt at XSSBeginner Guides
xss
5
6.3k
Apr 13
Help for burp collaboratorQuestions
1
701
Apr 13
Which network card do you recommend?Questions
wifi
5
1.1k
Apr 12
Writeup: 0x00sec CTF - Exercise #4CTF
5
1.6k
Apr 11
General summary
Questions
4
773
Apr 9
(VulnHub) WriteUp — WalkthroughCTF
ctf writeup hacking1
1.2k
Apr 8
Unrestricted CV File UploadBug Bounty
3
1.2k
Apr 8
Arch - Black ! (0x0)Beginner Guides
linux hacking
3
3.1k
Apr 6
Red Team - Gitbook
Red-Team
hacking
6
3.0k
Apr 6
Getting know - TCP handshake and messagesNetworking
6
2.1k
Apr 6
What is your go-to DNS enumeration methodology?Bug Bounty
dns enumeration massdns9
2.1k
Apr 4
How should I learn TrojanQuestions
hacking programming1
857
Apr 4
Introduction: 4554551N-533K3RSocial
1
964
Apr 3
Fishing for Malware
Malware
datadump database python6
2.1k
Apr 1
(VulnHub) DevRandom CTF: 1.1 | WriteUpCTF
ctf challenge writeuphacking
0
1.1k
Apr 1
Speeding Up NMAP UDP ScansPentesting
0
1.0k
Mar 31
Writeup: 0x00sec CTF - Exercise #1CTF
0x00ctf
2
3.0k
Mar 30
How to run .vlib.v.vs file?Questions
1
772
Mar 30
Not Anything Hacking Related, But I’m In a Dark PlaceSocial
38
7.3k
Mar 29
HackTheBox Writeup: SniperHackthebox Writeups
2
1.3k
Mar 28
Full-duplex and Half-duplexNetworking
2
1.5k
Mar 27
Looking for materialQuestions
1
779
Mar 27
Introducing: Bi-Monthly 0x00sec CTF Exercises! 0x00sec Announcements ctf beginner warmupsexercises
32
10.1k
Mar 27
GoSH, a Golang reverse/bind shell generatorProgramming
5
1.4k
Mar 26
Switching interests | HELPQuestions
hacking programming5
615
Mar 26
Windows Software Cracking / Patching tools being detected as a Virus/Trojan/Riskware ..etcQuestions
reverseengineering
1
1.1k
Mar 26
DevSecOps in robotics, the intersection of quality and securityHardware
0
1.1k
Mar 25
Writeup: 0x00sec CTF - Exercise #2CTF
4
2.2k
Mar 24
Statically linking “libcrypto” (openssl) in windows?Questions
0
915
Mar 24
Writeup: 0x00sec CTF - Exercise #3CTF
0
1.1k
Mar 21
Do anyone know any good course on malware developmentQuestions
malware botnet programminghacking
6
2.3k
Mar 20
DOOM95 | Making an aimbotReverse Engineering
gamehacking
7
10.7k
Mar 20
NoREpls - Part 6
Challenges
assembly crackme reverseengineeringwindows
11
4.6k
Mar 18
B01lers CTF: Jumpdrive WriteupCTF
beginner
2
1.2k
Mar 17
What does this golang code do?Questions
malware
9
1.3k
Mar 17
Invalid date Invalid dateDetails
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0