Binni Shah

Binni Shah

@binitamshah.bsky.social

Linux Evangelist, Malwares , Security Enthusiast, Investor, Contrarian , Neurology , Philanthropist , Reformist ,Sigma female

930 Followers 0 Following 359 Posts Joined Aug 2023
9 months ago
Linux Reverse Shell in x86 Assembly - ROOTFU.IN Introduction: Why Build a Reverse Shell in Assembly? Ever wondered how low-level code can create a powerful remote shell? In this post, we’ll dive into crafting a Linux reverse shell using x86 assembl...

Linux Reverse Shell in x86 Assembly : rootfu.in/linux-revers...

6 2 0 1
9 months ago
Video thumbnail

300 Milliseconds to Admin: Mastering DLL Hijacking and Hooking to Win the Race (CVE-2025-24076 and CVE-2025-24994) : blog.compass-security.com/2025/04/3-mi...

4 2 0 0
9 months ago
Post image

Bypassing kASLR via Cache Timing : r0keb.github.io/posts/Bypass...

kASLR Internals and Evolution : r0keb.github.io/posts/kASLR-... credits @r0keb

3 3 0 0
9 months ago
Post image

Cache poisoning via race-condition in Next.js : zhero-web-sec.github.io/research-and... credits @zhero___

2 2 0 0
9 months ago
Post image

O2 VoLTE : Locating any customer with a phone call : mastdatabase.co.uk/blog/2025/05...

2 1 0 0
9 months ago
Preview
Bypassing Web Filters Part 4: Host Header Spoofing & Domain Fronting Detection Bypasses – Compass Security Blog But – as you know – no system is perfect. This last post of the series discusses techniques that can sometimes be used to bypass domain fronting detection and prevention methods.

Bypassing Web Filters (Part 4) : Host Header Spoofing & Domain Fronting Detection Bypasses : blog.compass-security.com/2025/03/bypa...

3 : Domain Fronting : blog.compass-security.com/2025/03/bypa...

2 : Host Header Spoofing : blog.compass-security.com/2025/03/bypa...

2 2 0 0
9 months ago
1. Land Of The PEB - Modules and DLLs Welcome to my first series called “Land Of The PEB” where I will be discussing various topics related to the Process Environment Block (PEB). What is this thing? The Process Environment Block (we will...

Game Hacking : Part 1 - Land Of The PEB - Modules and DLLs : codeneverdies.github.io/posts/lotp-1/

Part 2 : Running from the debugger : codeneverdies.github.io/posts/lotp-2/

Part 3: BakkesMod : codeneverdies.github.io/posts/gh-1/

4 : Valve Anti-Cheat (VAC) : codeneverdies.github.io/posts/gh-2/

3 0 0 0
9 months ago
Post image Post image Post image

0-click RCE on Tesla Model 3 through TPMS Sensors : www.synacktiv.com/sites/defaul... credits @masthoon @vdehors

10 10 1 2
9 months ago
Preview
PE32 Ransomware: A New Telegram-Based Threat on the Rise  - ANY.RUN's Cybersecurity Blog Read technical analysis of PE32, a new ransomware strain that demands ransom for both decryption and not leaking stolen data.

PE32 Ransomware : A New Telegram-Based Threat on the Rise : any.run/cybersecurit... credits @MauroEldritch

2 0 0 0
9 months ago
Post image Post image Post image

Evolution of Tycoon 2FA Defense Evasion Mechanisms : Analysis and Timeline : any.run/cybersecurit...

2 0 0 0
9 months ago
Video thumbnail

HTML to PDF Renderer : A tale of local file access and shellcode execution : neodyme.io/en/blog/html...

1 0 0 0
9 months ago
Post image Post image Post image

Fileless Execution : PowerShell Based Shellcode Loader Executes Remcos RAT : blog.qualys.com/vulnerabilit...

0 2 0 0
9 months ago
Post image

Breaking up-to-date Windows 11 BitLocker encryption -- on-device but software-only : neodyme.io/en/blog/bitl...

3 0 0 0
9 months ago
Preview
ETH Zurich researchers discover new security vulnerability in Intel processors Computer scientists at ETH Zurich discover new class of vulnerabilities in Intel processors, allowing them to break down barriers between different users of a processor using carefully crafted instruc...

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks : ethz.ch/en/news-and-...

Ref :

*Speculative calculations open a backdoor to information theft (*2022) : ethz.ch/en/news-and-...

RETBLEED : www.usenix.org/system/files...

5 1 0 1
9 months ago
Preview
Mastering Rate Limit Bypass Techniques Learn How Hackers Bypass Rate Limits — and How You Can Too

Mastering Rate Limit Bypass Techniques : infosecwriteups.com/mastering-ra...

1 0 0 0
9 months ago
YouTube
Hacking Casino | How Math Beats the Casino Odds YouTube video by Sumsub

Hacking Casino - How Math Beats the Casino Odds : www.youtube.com/watch?v=87Fg...

Shuffle Up and Deal: Analyzing the Security of Automated Card Shufflers : i.blackhat.com/BH-US-23/Pre...

How To Rob a Casino : 0x00sec.org/t/how-to-rob...

2 0 0 0
9 months ago
Preview
Writing a Self-Mutating Malware This topic was automatically closed after 121 days. New replies are no longer allowed.

Writing a Self-Mutating Malware : 0x00sec.org/t/writing-a-...

Metamorphic Code Examples : stackoverflow.com/questions/10...

3 3 0 0
9 months ago
Preview
How To Rob a Casino Casinos, some view these places as something that corrupts the soul, leading individuals astray with the allure of easy money and instant gratification. Others see casinos as an escape from reality, s...

How To Rob a Casino : 0x00sec.org/t/how-to-rob...

1 0 0 0
9 months ago
Preview
macOS Malware Development II Today’s post is about writing fully custom malware targeting macOS. We’ll walk through its architecture, mutation techniques, and anti-analysis methods, with a focus on Mach-O internals and Darwin AP...

macOS Malware Development (Part 2) : 0x00sec.org/t/macos-malw...

Part 1 : 0x00sec.org/t/macos-malw...

Ref :

Inside a Hello World executable on OS X : adrummond.net/posts/macho

The Mystery of Mach-O Object Structure : alexdremov.me/mystery-of-m...

www2.cs.arizona.edu/~collberg/Te...

2 0 0 0
9 months ago
Post image Post image

Fuzzing Windows ARM64 closed-source binary : www.romainthomas.fr/post/25-04-w...

3 1 0 0
9 months ago
Post image Post image Post image

Litterbox : Sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment : github.com/BlackSnufkin...

0 0 0 0
10 months ago
Pupkin: A Simple .NET Info-Stealer Exfiltrating Data via Telegram Pupkin Stealer is a deceptively simple .NET-based stealer designed to harvest browser passwords, Discord tokens, and Telegram sessions — all controlled silently through a Telegram C2.

Pupkin : a deceptively simple .NET-based stealer designed to harvest browser passwords, Discord tokens, and Telegram sessions — all controlled silently through a Telegram C2 : muff-in.github.io/blog/pupkin-...

2 1 0 0
10 months ago
Post image

Linux running in Excel : github.com/NSG650/Linux...

1 0 0 0
10 months ago
GitHub - OFFTKP/felix86: Run x86-64 programs on RISC-V Linux Run x86-64 programs on RISC-V Linux. Contribute to OFFTKP/felix86 development by creating an account on GitHub.

felix86 : Run x86-64 programs on RISC-V Linux : github.com/OFFTKP/felix86

1 0 0 0
10 months ago
Home

LigerLabs - Educational Modules for (Anti-)Reverse Engineering : ligerlabs.org

0 0 0 0
10 months ago
Post image Post image

Attacking My Landlord's Boiler : blog.videah.net/attacking-my...

1 0 0 0
10 months ago
Preview
How I Found Malware in a BeamNG Mod An analysis using Process Monitor and WinDbg, dealing with JavaScript, WASM, and Windows shellcode.

How I Found Malware in a BeamNG Mod : lemonyte.com/blog/beamng-...

1 0 0 0
10 months ago
Preview
How I made $64k from deleted files — a bug bounty story TL;DR — I built an automation that cloned and scanned tens of thousands of public GitHub repos for leaked secrets. For each repository I…

How I made $64k from deleted files — a bug bounty story : medium.com/@sharon.briz...

2 1 0 0
10 months ago
Preview
How a Single Line Of Code Could Brick Your iPhone | Rambo Codes Gui Rambo writes about his coding and reverse engineering adventures.

How a Single Line Of Code Could Brick Your iPhone : rambo.codes/posts/2025-0...

0 0 0 0
10 months ago
Video thumbnail

AirBorne : Wormable Zero-Click RCE in Apple AirPlay Puts Billions of Devices at Risk : www.oligo.security/blog/airborne

1 2 0 0