0x00sec Forum
4,252 FOLLOWERS
0x00sec is the Home of the Hacker. Read discussions on topics such as malware, reverse engineering, and computer science. Also, get to know about red team infrastructure, exploit development, cryptology, and pentesting and basic hacking guides.
0x00sec Forum
2d ago
Introduction
In this article, we’ll cover Self-mutating/self-modifying malware with the simplest obfuscation techniques out there, covering some characteristics of both polymorphic and metamorphic. Since I’ve discussed malware in previous articles, I’ll stick to the usual routine: giving a brief overview of how the malware operates, providing a few examples, and then a detailed explanation. Source Code
So, what’s the deal with “Metamorphic”? Well, making malware that can’t be easily detected is quite challenging. You have to change how the code looks without altering what it does, especially i ..read more
0x00sec Forum
5d ago
Hey there, does anyone knows any phishing tool with templates in spanish? Or any user (@) that creates them who is native spanish speaker?
Thank youxx. my telegram is amdm326 in case anyone want to help me
1 post - 1 participant
Read full topic ..read more
0x00sec Forum
5d ago
Hey there
anyone knows any phishing tool with templates in spanish?
Or any user (@) that creates them who is native spanish speaker?
Thanksxx
My tg is amdm326 in case anyone wants to help
1 post - 1 participant
Read full topic ..read more
0x00sec Forum
1w ago
ReverseMe
I’ve got another challenge! It’s been a while since I posted my first challenge, Cipher. So, I had some free time on my hands and wrote a simple ReverseMe. Difficulty? I’d say it’s somewhere between easy and intermediate, maybe easy depending on your current knowledge. Enjoy!
Executable
H4sIAIceH2YC/+1bbWwUxxmevfPZZ2P7DrAbAqQ+IlJwg882GAQhDjbmYF0BMh8mpGo51r61fe75bN2tg41wcHsJ4XBcQdTSzx+kP5Ca9gdJoyhBEbYhPQeEogNVhKgfchGJ7mrTukApYNfbd/ZmfLNTL46iSu2Pfa27Z97nfd/52pnZ8e3sYc/
WzRZBQFSs6DmENdfclF5F+KqV0y7ArUV58P0EWowyQc9g/Ti8btGjfbqcVNwCa0rncTHSo8BgBjKWjmw9Imc6zsboPP7Spkc2TivPRXgOTwl6ZONw38RL ..read more
0x00sec Forum
1w ago
For privacy obviously I wont share the site name, but the site is vulnerable explained in the following cve:
cvedetails.com CVE-2011-1431 : The STARTTLS implementation in qmail-smtpd.c in qmail-smtpd...
CVE-2011-1431 : The STARTTLS implementation in qmail-smtpd.c in qmail-smtpd in the netqmail-1.06-tls patch for netqmail 1.06 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP...
Seems like the attack is basically executed by a hacker listening to a victims email, and then when they recieve that victims packet they can manip ..read more
0x00sec Forum
2w ago
Introduction
In this article, we’ll delve into the world of designing and developing malware for macOS, which is essentially a Unix-based operating system. We’ll take a classic approach to exploring Apple’s internals. All you need is a basic understanding of exploitation, along with knowledge of C and Python programming, as well as some familiarity with low-level assembly language to grasp the details here. While the topics discussed may be advanced, I’ll do my best to present them smoothly.
Let’s start by understanding the macOS architecture and its security features. We’ll then delve into th ..read more
0x00sec Forum
3w ago
Introduction
In this article, we’ll delve into the world of designing and developing malware for macOS, which is essentially a Unix-based operating system. We’ll take a classic approach to exploring Apple’s internals. All you need is a basic understanding of exploitation, along with knowledge of C and Python programming, as well as some familiarity with low-level assembly language to grasp the details here. While the topics discussed may be advanced, I’ll do my best to present them smoothly.
Let’s start by understanding the macOS architecture and its security features. We’ll then delve into th ..read more
0x00sec Forum
3w ago
Hello, my friends. Lately, I have been struggling to bypass this horrendous image below from the windows defender smartscreen.
Print windows defender smartscreen.jpg
For my current understanding, this happens because the executable is not signed. So I came here to ask if you guys can provide more information, links, videos, or literary anything on the subject.
I want to learn more on how to bypass this, but it has been very hard to find information.
Do you guys know any other techniques to bypass this other than signing the executable?
Ty all
Sharing a very interesting technique => CVE-2023 ..read more
0x00sec Forum
1M ago
Beginner who need a good friend to build me up and make me not cmmit suicide for bieng bullied
1 post - 1 participant
Read full topic ..read more
0x00sec Forum
1M ago
Introduction
In this article, we’ll delve into the world of designing and developing malware for macOS, which is essentially a Unix-based operating system. We’ll take a classic approach to exploring Apple’s internals. All you need is a basic understanding of exploitation, along with knowledge of C and Python programming, as well as some familiarity with low-level assembly language to grasp the details here. While the topics discussed may be advanced, I’ll do my best to present them smoothly.
Let’s start by understanding the macOS architecture and its security features. We’ll then delve into th ..read more