Cyber Guardians @ircyberguardians Channel on Telegram

Cyber Guardians

@ircyberguardians


RedTeaming TTPs
Bug Hunting
Web PenTest
Web Security
Binary Analysis
Exploit DEV
Malware DEV
Malware Analysis
BlueTeaming
Threat Hunting
SOC
CSIRT
FORENSICS
Open-Source Intelligence(OSINT)
Cybersec Tools

Cyber Guardians (English)

Are you passionate about cybersecurity and looking to expand your knowledge in the field? Look no further than the Telegram channel 'Cyber Guardians'! This channel, with the username '@ircyberguardians', is dedicated to all things related to cybersecurity, from Red Teaming TTPs to Bug Hunting, Web Penetration Testing to Binary Analysis, Exploit Development to Malware Analysis, and everything in between. Whether you're an experienced cybersecurity professional or just starting out in the field, 'Cyber Guardians' offers valuable resources, discussions, and insights to help you stay up-to-date with the latest trends and techniques in cybersecurity. The channel covers a wide range of topics, including Blue Teaming, Threat Hunting, SOC (Security Operations Center), CSIRT (Computer Security Incident Response Team), FORENSICS, Open-Source Intelligence (OSINT), and Cybersecurity Tools. Joining 'Cyber Guardians' provides you with the opportunity to connect with like-minded individuals, share knowledge, ask questions, and collaborate on cybersecurity projects. The channel serves as a platform for cybersecurity enthusiasts to come together to learn, grow, and contribute to the community. Whether you're interested in learning about new cybersecurity techniques, discussing best practices with industry professionals, or sharing your own expertise, 'Cyber Guardians' has something for everyone. Join today and become a part of a vibrant community of cybersecurity enthusiasts dedicated to protecting the digital world from threats and vulnerabilities. Stay informed, stay connected, and stay secure with 'Cyber Guardians'!

Cyber Guardians

21 Nov, 12:30


PanGPA Extractor

Tool to extract username and password of current user from PanGPA in plaintext under Windows. Palo Alto Networks GlobalProtect client queries the GlobalProtect Service for your username and password everytime you log on or refresh the connection.

https://shells.systems/extracting-plaintext-credentials-from-palo-alto-global-protect/

https://github.com/t3hbb/PanGP_Extractor
@IRCyberGuardians

Cyber Guardians

21 Nov, 12:30


One Sock Fits All: The use and abuse of the NSOCKS botnet https://blog.lumen.com/one-sock-fits-all-the-use-and-abuse-of-the-nsocks-botnet/

@IRCyberGuardians

Cyber Guardians

21 Nov, 12:30


Linux Kernel Exploitation - ret2usr
https://scoding.de/linux-kernel-exploitation-buffer_overflow

@IRCyberGuardians

Cyber Guardians

21 Nov, 12:30


A deep dive into Linux’s new mseal syscall https://blog.trailofbits.com/2024/10/25/a-deep-dive-into-linuxs-new-mseal-syscall/
@IRCyberGuardians

Cyber Guardians

21 Nov, 12:30


Leveling Up Fuzzing: Finding more vulnerabilities with AI

http://security.googleblog.com/2024/11/leveling-up-fuzzing-finding-more.html

@IRCyberGuardians

Cyber Guardians

20 Nov, 12:30


From HTTP to RCE. How to leave backdoor in IIS

https://cicada-8.medium.com/from-http-to-rce-how-to-leave-backdoor-in-iis-cbef8249eba9

@IRCyberGuardians

Cyber Guardians

20 Nov, 12:30


EDR Internals for macOS and Linux

https://www.outflank.nl/blog/2024/06/03/edr-internals-macos-linux/

@IRCyberGuardians

Cyber Guardians

20 Nov, 12:30


Reverse Engineering iOS 18:
Inactivity Reboot
https://naehrdine.blogspot.com/2024/11/reverse-engineering-ios-18-inactivity.html

@IRCyberGuardians

Cyber Guardians

20 Nov, 12:30


Making a Powershell Shellcode Downloader that Evades Defender (Without Amsi Bypass)

https://medium.com/@luisgerardomoret_69654/making-a-powershell-shellcode-downloader-that-evades-defender-without-amsi-bypass-d2cf13f18409

@IRCyberGuardians

Cyber Guardians

20 Nov, 12:30


GPUAF - Two ways of Rooting All Qualcomm based Android phones
https://powerofcommunity.net/poc2024/Pan%20Zhenpeng%20&%20Jheng%20Bing%20Jhong,%20GPUAF%20-%20Two%20ways%20of%20rooting%20All%20Qualcomm%20based%20Android%20phones.pdf

@IRCyberGuardians

Cyber Guardians

18 Nov, 12:30


Malware and cryptography: encrypt payload via DFC algorithm. Simple C example
https://cocomelonc.github.io/malware/2024/11/10/malware-cryptography-34.html

@IRCyberGuardians

Cyber Guardians

18 Nov, 12:30


Sensitive Data Exposure in a Moodle Config File

https://medium.com/@mrcix/sensitive-data-exposure-in-a-moodle-config-file-648ca3d54676

@IRCyberGuardians

Cyber Guardians

18 Nov, 12:30


https://powerofcommunity.net/poc2024/Meysam%20Firouzi,%20Pishi%20-%20Coverage-Guided%20Fuzzing%20of%20the%20XNU%20Kernel%20and%20Arbitrary%20KEXT.pdf

@IRCyberGuardians

Cyber Guardians

18 Nov, 12:30


Wrote a small C# tool that is able to make a network token using a certificate. Comes handy in RTs
https://github.com/nettitude/TokenCert

@IRCyberGuardians

Cyber Guardians

18 Nov, 12:30


Introducing PowerHuntShares 2.0 Release

introduces new insights, charts, graphs, & LLM capabilities that can be used to map the relationships & risks being exposed through the network shares:
https://www.netspi.com/blog/technical-blog/network-pentesting/powerhuntshares-2-0-release/

@IRCyberGuardians

Cyber Guardians

17 Nov, 12:30


Fuzzing for complex bugs across languages in JavaScript Engines - https://powerofcommunity.net/poc2024/Carl%20Smith,%20Fuzzing%20for%20complex%20bugs%20across%20languages%20in%20JavaScript%20Engines.pdf

@IRCyberGuardians

Cyber Guardians

17 Nov, 12:30


URLFinder - passive URL discovery tool
https://github.com/projectdiscovery/urlfinder

@IRCyberGuardians

Cyber Guardians

17 Nov, 12:30


Mythic C2 Agent with PowerShell
https://youtu.be/3M_1Q65s57g

@IRCyberGuardians

Cyber Guardians

17 Nov, 12:30


Advanced Fuzzing With LibAFL @ Ekoparty 2024 - https://docs.google.com/presentation/d/1ILXdsBx6JJbsf3uq-_hSeYux-a0DRRPxebOY65EDE5o/edit?usp=sharing

@IRCyberGuardians

Cyber Guardians

17 Nov, 12:30


x64 Assembly & Shellcoding 101

Part 1:
https://g3tsyst3m.github.io/shellcoding/assembly/debugging/x64-Assembly-&-Shellcoding-101/

Part 2:
https://g3tsyst3m.github.io/shellcoding/assembly/debugging/x64-Assembly-&-Shellcoding-101-Part-2/

Part 3:
https://g3tsyst3m.github.io/shellcoding/assembly/debugging/x64-Assembly-&-Shellcoding-101-Part-3/

Part 4:
https://g3tsyst3m.github.io/shellcoding/assembly/debugging/x64-Assembly-&-Shellcoding-101-Part-4/

Part 5:
https://g3tsyst3m.github.io/shellcoding/assembly/debugging/x64-Assembly-&-Shellcoding-101-Part-5/

Part 6:
https://g3tsyst3m.github.io/shellcoding/assembly/debugging/x64-Assembly-&-Shellcoding-101-Part-6/

@IRCyberGuardians