med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

369
active users

#shellcode

0 posts0 participants0 posts today
h o ʍ l e t t<p>→ <a href="https://mamot.fr/tags/Speedrunners" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Speedrunners</span></a> are <a href="https://mamot.fr/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> researchers, they just don't know it yet<br><a href="https://zetier.com/speedrunners-are-vulnerability-researchers/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">zetier.com/speedrunners-are-vu</span><span class="invisible">lnerability-researchers/</span></a></p><p>“Super Mario World runners will place items in extremely precise locations so that the X,Y coordinates form <a href="https://mamot.fr/tags/shellcode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shellcode</span></a> they can jump to with a dangling reference. Legend of <a href="https://mamot.fr/tags/Zelda" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Zelda</span></a>: Ocarina of Time players will do heap grooming and write a <a href="https://mamot.fr/tags/function" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>function</span></a> pointer […] so the game “wrong warps” directly to the <a href="https://mamot.fr/tags/end" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>end</span></a> <a href="https://mamot.fr/tags/credit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>credit</span></a> sequence… with nothing more than a <a href="https://mamot.fr/tags/game" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>game</span></a> <a href="https://mamot.fr/tags/controller" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>controller</span></a> and a steady <a href="https://mamot.fr/tags/hand" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hand</span></a>”</p><p><a href="https://mamot.fr/tags/Mario" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mario</span></a></p>
cryptax<p>Decai decompiling a malicious shellcode. <br>The instructions are not so readable, if you're not used to syscalls int 0x80. AI does it for you.</p><p><a href="https://asciinema.org/a/4PY8wn2TPg2oBdDQ0Q5bgMYjk" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">asciinema.org/a/4PY8wn2TPg2oBd</span><span class="invisible">DQ0Q5bgMYjk</span></a></p><p><a href="https://mastodon.social/tags/r2ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>r2ai</span></a> <a href="https://mastodon.social/tags/decai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>decai</span></a> <a href="https://mastodon.social/tags/r2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>r2</span></a> <a href="https://mastodon.social/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://mastodon.social/tags/shellcode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shellcode</span></a> <a href="https://mastodon.social/tags/syscall" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>syscall</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a></p>
Anonymous 🐈️🐾☕🍵🏴🇵🇸 :af:<p>[ <a href="https://kolektiva.social/tags/Shellcode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shellcode</span></a> x64] Find and execute WinAPI functions with Assembly <a href="https://print3m.github.io/blog/x64-winapi-shellcoding" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">print3m.github.io/blog/x64-win</span><span class="invisible">api-shellcoding</span></a> <a href="https://kolektiva.social/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://kolektiva.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://kolektiva.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a></p>
r1cksec<p>New cheatsheets pushed 🕵️‍♂️​</p><p><a href="https://github.com/r1cksec/cheatsheets" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/r1cksec/cheatsheets</span><span class="invisible"></span></a></p><p>Including:</p><p>A nice writeup about a XSS vulnerability found on chess.com♟️​<br><a href="https://skii.dev/rook-to-xss" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">skii.dev/rook-to-xss</span><span class="invisible"></span></a></p><p>This tool can be used as a framework for CI/CD security analysis :github:​<br><a href="https://github.com/CycodeLabs/raven" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/CycodeLabs/raven</span><span class="invisible"></span></a></p><p>A great post about Process Injection in the context of Kernel Triggered Memory Scans :hacked:​<br><a href="https://www.r-tec.net/r-tec-blog-process-injection-avoiding-kernel-triggered-memory-scans.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">r-tec.net/r-tec-blog-process-i</span><span class="invisible">njection-avoiding-kernel-triggered-memory-scans.html</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/xss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xss</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/git" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>git</span></a> <a href="https://infosec.exchange/tags/github" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>github</span></a> <a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/shellcode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shellcode</span></a></p>
qbi<p>Hier hat mal jemand eine schadhafte Excel-Datei auseinandergenommen. Es nutzt eine Schwachstelle im Formeleditor (CVE-2017-11882) aus und lädt schadhafte Inhalte nach.</p><p><a href="https://isc.sans.edu/diary/Simple+Shellcode+Dissection/29642" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">isc.sans.edu/diary/Simple+Shel</span><span class="invisible">lcode+Dissection/29642</span></a></p><p><a href="https://mastodon.social/tags/Shellcode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Shellcode</span></a> <a href="https://mastodon.social/tags/Excel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Excel</span></a> <a href="https://mastodon.social/tags/OLE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OLE</span></a></p>
postmodern<p>Should reverse shell shellcode payloads accept only IPs, or accept host names and automatically resolve them to IPs?<br><a href="https://infosec.exchange/tags/shellcode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shellcode</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a></p>