Malware Development is not only for shellcode runners, it is also for creating exploits and C2 frameworks. Join me on this stream where we continue the series of Mythic C2 agent development! We are getting closer and closer to the end goal of having a nice and easy powershell beacon.

🚀 In this stream, you’ll learn:

* The fundamentals of C2 frameworks and how they are used in penetration testing.
* Step-by-step malware development techniques for creating custom commands and modules.
* How to customize a Mythic C2 agent to suit specific red team operations.
* Best practices for ensuring operational security (OPSEC) while using C2 frameworks.

SUPPORT MY WORK BY BECOMMING PATREON
—————————————————
https://patreon.com/Lsecqt

⚠️ DISCLAIMER: This video is for educational purposes only. The techniques demonstrated are intended solely for ethical hacking and lawful security testing on systems where you have explicit permission. Always follow legal guidelines and obtain proper authorization before conducting any security tests.

#EthicalHacking #MythicC2 #MalwareDevelopment #RedTeam #Cybersecurity #C2Agent #PenetrationTesting #LiveCoding

FOLLOW ME
—————————————————
Patreon: https://patreon.com/Lsecqt
Twitter: https://twitter.com/lsecqt
Twitch: https://www.twitch.tv/lsecqt
Reddit: https://www.reddit.com/user/lsecqt
Medium: https://medium.com/@lsecqt
Support my Work: https://www.buymeacoffee.com/lsecqt
Red Teaming Army Discord Server: https://discord.gg/dWCe5ZMvtQ Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/
Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/

C2 development
malware development
maldev
mythic c2
c2 agent creation
creating c2 agent
coding malware
hacking
ethical hacking

Read More

Turn your videos into live streams with Restream https://restre.am/ANIm

Join us for an exciting episode of Simply Cyber Firesides with your host, Gerald Auger, Ph.D.! Our special guest this time is Josh Stroschein, a reverse engineer and malware analyst at FLARE (Google/Mandiant).

Josh has shared his expertise at major conferences like BlackHat and DerbyCon, and he’s also an Assistant Professor of Cyber Security at Dakota State University. You might recognize him from his popular content on YouTube and Pluralsight! #TheCyberYeti

Tune in to hear Josh discuss malware analysis, reverse engineering, content creation, and more! Get your questions answered live! 🔥

Don’t miss out—mark your calendars!

#malwareanalysis

Read More

Access Home Assistant (and your house) from anywhere (free): https://ntck.co/twingate_zerotrust

I’ve got a problem only home automation can fix. My youngest daughter keeps throwing entire rolls of toilet paper into the toilet because people keep leaving the lid and bathroom door open! So, I turned to Home Assistant to solve it. In this video, I’ll show you how I tackled this problem and walk you through setting up Home Assistant for your own home.

📄📄📄Link/Guide/Documentation: https://academy.networkchuck.com/blog/home-assistant

🛒Supplies List:
➡️Raspberry Pi 5 (kit): https://geni.us/z0BVIc
➡️Raspberry Pi 4 (kit): https://geni.us/mzJF55
➡️Plug and Play – Home Assistant Green: https://geni.us/XF8r7AH
➡️Zigbee Adapter (Ethernet): https://geni.us/ufDk8
➡️Zigbee Adapter (USB): https://geni.us/HfPvU

IoT Devices (recommended)
Light Bulbs (Zigbee): https://geni.us/pjr0BB
Contact Sensor (Zigbee): https://geni.us/ufdgFx
Proximity (motion) Sensor (Zigbee): https://geni.us/GPfLHN
Phillips Hue: https://geni.us/x4PERqP

🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy

**Sponsored by Twingate

SUPPORT NETWORKCHUCK
—————————————————
➡️NetworkChuck membership: https://ntck.co/Premium
☕☕ COFFEE and MERCH: https://ntck.co/coffee

Check out my new channel: https://ntck.co/ncclips

🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck

STUDY WITH ME on Twitch: https://bit.ly/nc_twitch

READY TO LEARN??
—————————————————
-Learn Python: https://bit.ly/3rzZjzz
-Get your CCNA: https://bit.ly/nc-ccna

FOLLOW ME EVERYWHERE
—————————————————
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord

AFFILIATES & REFERRALS
—————————————————
(GEAR I USE…STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
fast and reliable unifi in the cloud: https://hostifi.com/?via=chuck

1. “How to Automate Your Home Using Home Assistant and Raspberry Pi”
2. “Solving Everyday Household Problems with Smart Home Technology”
3. “Using Home Assistant to Keep Your Toilet Lid and Bathroom Door Closed”
4. “DIY Smart Home Automation Tutorial for Beginners”
5. “Step-by-Step Guide: Setting Up Home Assistant on Raspberry Pi”
6. “Integrate Zigbee Contact Sensors with Home Assistant Easily”
7. “Creative Home Automation Ideas to Prevent Toilet Mishaps”
8. “Home Assistant Automations Using Proximity Sensors Explained”
9. “Smart Home Parenting Hacks: Keep Kids Safe with Technology”
10. “Control TVs with Custom Messages Using Home Assistant and Plex”
11. “How to Flash Smart Lights as Alerts with Home Assistant”
12. “Managing Internet Access via Home Assistant and Firewall Rules”
13. “Combining Plex and Apple TV in Home Automation Projects”
14. “Solving Real-Life Issues with DIY Home Automation Solutions”
15. “Top Smart Home Devices for Home Automation in 2023”
16. “Complete Guide to Using Home Assistant for Home Automation”
17. “Automate Household Tasks with Smart Sensors and Home Assistant”
18. “Prevent Bathroom Accidents with Smart Home Technology”
19. “Using Home Assistant to Manage and Control Smart Devices”
20. “Integrate Smart Lights, Sensors, and Media Players Seamlessly”
21. “Home Automation Projects for Parents: Keep Your House Safe”
22. “Use Technology to Solve Common Parenting Challenges”
23. “Home Assistant Automations: From Idea to Implementation”
24. “Build a Smart Home System with Raspberry Pi and Home Assistant”
25. “Advanced Home Assistant Automations for Creative Solutions”

#homeassistant #raspberrypi #homeautomation

Read More

Start Your IT Career with CourseCareers Free IT Intro Course (Plus $50 off): https://coursecareers.com/a/WithSandracourse=it

📚 Google Cybersecurity Certificate: http://imp.i384100.net/k0R0rz

🧭 Springboard Cybersecurity Bootcamp (Get a Job or Your Money Back Guaranteed – $1000 off Code WITHSANDRA): https://www.springboard.com/landing/influencer/withsandra

Cybersecurity for Beginners: https://links.zerotomastery.io/cybersecurityforbeginners_WithSandra
How to Get Started with Bug Bounties: https://links.zerotomastery.io/bugbounty_WithSandra
Cybersecurity Career Path: https://links.zerotomastery.io/cybersecuritycareerpath_WithSandra
AI in Cybersecurity: https://links.zerotomastery.io/AICybersecurity_WithSandra
Career Path Quiz: https://links.zerotomastery.io/careerpathquiz_WithSandra

💡 Ace your cybersecurity interviews with my Cybersecurity Interview Prep Mastery Course: https://learn.withcybersecurity.com/
💻 My Cyber Security Career Resources: https://withsandra.square.site/

📕 Get My FREE Cybersecurity Beginner Roadmap Guide: https://www.withsandra.dev/

——————————————————

Brand/collaboration inquiries: [email protected]

Disclaimer: All opinions expressed in videos on this YouTube channel are solely my own. Some links are affiliate links, as an Amazon Influencer, I earn from qualifying purchases.

👯 Join our Discord 😀 – https://discord.gg/2YZUVbbpr9

Connect on LinkedIn: https://www.linkedin.com/in/withsandra/
Instagram: https://www.instagram.com/cyberwithsandra
Luca’s SWE Channel: https://www.youtube.com/c/TechwithLuca

❈ My Desk/Tech Stuff on Amazon ❈
https://www.amazon.com/shop/withlove.sandra

Top 5 Beginner Cybersecurity Projects: https://youtu.be/zc7LTa9q2nI

#cybersecurity #cybersecurityforbeginners #cybersecuritydayinthelife
——————————————————

Current sub count: 106,000

Tags: Do You Have What It Takes to Work in Cybersecurity,What It’s REALLY Like Working in Cybersecurity,what its like working in cybersecurity,what is it like working in cybersecurity,reality of working in cybersecurity,reality of working in cyber security,the reality of working in cybersecurity,do you have what it takes to work in cyber security,the truth behind working in cybersecurity,how its like working in cybersecurity,cybersecurity for beginners,cyber security for beginners

Read More

⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️

@endingwithali →
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev

Want to work with Ali? [email protected]

[❗] Join the Patreon→ https://patreon.com/threatwire
00:00 0 – Intro
00:09 1 – Safari Surf Vulnerability
02:00 2 – Leave Internet Archive Alone
03:55 3 – New Quantum RSA Encryption Break
04:56 4 – Call of Duty Under Attack
05:58 5 – Outro

LINKS
🔗 Story 1: Safari Surf Vulnerability
https://www.microsoft.com/en-us/security/blog/2024/10/17/new-macos-vulnerability-hm-surf-could-lead-to-unauthorized-data-access/
https://www.malwarebytes.com/blog/news/2024/10/microsoft-reveals-details-about-hm-surf-vulnerability-in-macos
https://www.darkreading.com/vulnerabilities-threats/macos-safari-exploit-camera-mic-browser-data
https://www.theregister.com/2024/10/21/microsoft_macos_hm_surf/
🔗 Story 2: Leave Internet Archive Alone
https://www.bleepingcomputer.com/news/security/internet-archive-breached-again-through-stolen-access-tokens/
https://www.msn.com/en-us/news/us/the-world-s-largest-internet-archive-is-under-siege-and-fighting-back/ar-AA1suLAx
https://www.theregister.com/2024/10/21/internet_archive_zendesk_access_attack/
🔗 Story 3: New Quantum RSA Encryption Break
https://www.csoonline.com/article/3562701/chinese-researchers-break-rsa-encryption-with-a-quantum-computer.html
https://www.darkreading.com/application-security/chinese-researchers-unveil-quantum-technique-to-break-encryption
https://www.cpomagazine.com/cyber-security/chinese-researchers-use-quantum-computer-to-crack-rsa-encryption/
https://scitechdaily.com/computer-scientists-set-new-record-for-cryptographic-challenge/
🔗 Story 4: Call of Duty Under Attack
https://x.com/zebleerpo/status/1847024778600689706
https://x.com/CODUpdates/status/1847001212761350574
—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Community → https://www.hak5.org/community
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
____________________________________________

Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Read More

You say “bye” first! – no, you say “bye” first! – how do you know when to close the connection? Dr Richard G. Clegg of Queen Mary University London talks us through this frustrating network problem.

Computerphile is supported by Jane Street. Learn more about them (and exciting career opportunities) at: https://jane-st.co/computerphile

This video was filmed and edited by Sean Riley.

Computerphile is a sister project to Brady Haran’s Numberphile. More at https://www.bradyharanblog.com

Read More

Want to try for yourself? Find the code on Github → https://github.com/lennox-davidlevy/ai-applied-code-gen-repeat
Learn more about the technology → https://www.ibm.com/watsonx

Want to learn how to build a robust AI application? Join technology engineer David Levy as he guides you through creating a pet naming suggestion application using Generative AI and prompting techniques. From setting up a React TypeScript UI to integrating with a Python FastAPI backend, this interactive tutorial will guide you through the process of building a real-world AI project.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://www.ibm.com/account/reg/us-en/signup?formid=news-urx-52120

#ai #genai #generativeai #python #api

Read More

Get a Free System Design PDF with 158 pages by subscribing to our weekly newsletter: https://bit.ly/bbg-social

Animation tools: Adobe Illustrator and After Effects.

Checkout our bestselling System Design Interview books:
Volume 1: https://amzn.to/3Ou7gkd
Volume 2: https://amzn.to/3HqGozy

The digital version of System Design Interview books: https://bit.ly/3mlDSk9

ABOUT US:
Covering topics and trends in large-scale system design, from the authors of the best-selling System Design Interview series.

Read More

Learn how to master simple functions in programming by summing two numbers efficiently! This short tutorial walks you through the basics of creating a function that adds two numbers, perfect for beginners or those looking to sharpen their skills. Improve your coding efficiency and logic with this easy-to-follow guide. Watch now and take your coding to the next level!

#SimpleFunctions #LearnProgramming #CodingBasics #ProgrammingTips #FunctionsInCode

Read More

Part 7 finally shows the full runtime linking technique by investigating how the trampolines are created, how the function pointer is resolved and then obfuscated again, and an example function call. You’ll also see how they check the heap memory for debugging with the pattern 0xABABABAB.

Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join

Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
🎓 Courses on Pluralsight 👉🏻 https://www.pluralsight.com/authors/josh-stroschein
🌶️ YouTube 👉🏻 Like, Comment & Subscribe!
🙏🏻 Support my work 👉🏻 https://patreon.com/JoshStroschein
🌎 Follow me 👉🏻 https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
⚙️ Tinker with me on Github 👉🏻 https://github.com/jstrosch
🤝 Join the Discord community and more 👉🏻 https://www.thecyberyeti.com

1:03 Starting with the function that creates the trampolines
1:45 Location of the new import table
2:00 Concerning precomputed values
3:05 Typing arguments
5:45 Loading the required DLLs
7:37 Debugging
9:30 Preparing to store function pointers
12:00 Getting the desired function pointer
13:20 Allocating new memory
14:12 Checking memory for padding bytes 0xABABABAB
16:30 Basis for the trampoline
17:05 Generating random numbers
21:00 Adding code to the trampoline
26:21 Example function call
27:43 Wrapping up and recap

Read More

Explore the podcast → https://ibm.biz/Bdam9S

There’s a vanguard leading the charge to make AI accessible to all, and others are still catching up. Yet, amidst this progress, a concerning reality exists: a gender gap is forming in the field of AI. As much as we talk about reducing AI bias and promoting AI diversity, women and lower income populations are being left out, avoiding AI or in some cases using it without knowing they are. The good news is, it’s not too late. Listen to Reshma Saujani, Founder & CEO of Girls Who Code, talk about “aspirational AI” and what we can do to close the gap

Read the Ai in Action 2024 Report → https://ibm.biz/Bdam9v

The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.

Read More

Download the virtual assistant guide to learn more → https://ibm.biz/BdaqZr
Learn more about AI solutions → https://ibm.biz/BdaqZs

Recommendation engines are a crucial part of our online experience, suggesting products, videos, and content that we might like. But have you ever wondered how they work? In this video, Martin Keen takes a deep dive into the world of recommendation engines, exploring the intersection of machine learning and personalization. From collaborative filtering to content-based filtering, to the benefits & challenges of AI recommendation engines, discover how machine learning powers the personalized experiences we love.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://ibm.biz/BdaqZi

Read More