Binni Shah's Avatar

Binni Shah

@binitamshah.bsky.social

Linux Evangelist, Malwares , Security Enthusiast, Investor, Contrarian , Neurology , Philanthropist , Reformist ,Sigma female

871 Followers  |  0 Following  |  359 Posts  |  Joined: 26.08.2023  |  1.0484

Latest posts by binitamshah.bsky.social on Bluesky

Linux Reverse Shell in x86 Assembly - ROOTFU.IN Introduction: Why Build a Reverse Shell in Assembly? Ever wondered how low-level code can create a powerful remote shell? In this post, we’ll dive into crafting a Linux reverse shell using x86 assembl...

Linux Reverse Shell in x86 Assembly : rootfu.in/linux-revers...

21.05.2025 13:32 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 0    πŸ“Œ 1
Video thumbnail

300 Milliseconds to Admin: Mastering DLL Hijacking and Hooking to Win the Race (CVE-2025-24076 and CVE-2025-24994) : blog.compass-security.com/2025/04/3-mi...

20.05.2025 07:24 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Bypassing kASLR via Cache Timing : r0keb.github.io/posts/Bypass...

kASLR Internals and Evolution : r0keb.github.io/posts/kASLR-... credits @r0keb

20.05.2025 06:40 β€” πŸ‘ 3    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image

Cache poisoning via race-condition in Next.js : zhero-web-sec.github.io/research-and... credits @zhero___

20.05.2025 06:14 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

O2 VoLTE : Locating any customer with a phone call : mastdatabase.co.uk/blog/2025/05...

20.05.2025 06:05 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Bypassing Web Filters Part 4: Host Header Spoofing & Domain Fronting Detection Bypasses – Compass Security Blog But – as you know – no system is perfect. This last post of the series discusses techniques that can sometimes be used to bypass domain fronting detection and prevention methods.

Bypassing Web Filters (Part 4) : Host Header Spoofing & Domain Fronting Detection Bypasses : blog.compass-security.com/2025/03/bypa...

3 : Domain Fronting : blog.compass-security.com/2025/03/bypa...

2 : Host Header Spoofing : blog.compass-security.com/2025/03/bypa...

18.05.2025 14:55 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
1. Land Of The PEB - Modules and DLLs Welcome to my first series called β€œLand Of The PEB” where I will be discussing various topics related to the Process Environment Block (PEB). What is this thing? The Process Environment Block (we will...

Game Hacking : Part 1 - Land Of The PEB - Modules and DLLs : codeneverdies.github.io/posts/lotp-1/

Part 2 : Running from the debugger : codeneverdies.github.io/posts/lotp-2/

Part 3: BakkesMod : codeneverdies.github.io/posts/gh-1/

4 : Valve Anti-Cheat (VAC) : codeneverdies.github.io/posts/gh-2/

18.05.2025 13:52 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image Post image Post image

0-click RCE on Tesla Model 3 through TPMS Sensors : www.synacktiv.com/sites/defaul... credits @masthoon @vdehors

18.05.2025 11:34 β€” πŸ‘ 10    πŸ” 9    πŸ’¬ 1    πŸ“Œ 2
Preview
PE32 Ransomware: A New Telegram-Based Threat on the RiseΒ  - ANY.RUN's Cybersecurity Blog Read technical analysis of PE32, a new ransomware strain that demands ransom for both decryption and not leaking stolen data.

PE32 Ransomware : A New Telegram-Based Threat on the Rise : any.run/cybersecurit... credits @MauroEldritch

17.05.2025 13:11 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image Post image Post image

Evolution of Tycoon 2FA Defense Evasion Mechanisms : Analysis and Timeline : any.run/cybersecurit...

17.05.2025 12:59 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

HTML to PDF Renderer : A tale of local file access and shellcode execution : neodyme.io/en/blog/html...

17.05.2025 12:55 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image Post image Post image

Fileless Execution : PowerShell Based Shellcode Loader Executes Remcos RAT : blog.qualys.com/vulnerabilit...

17.05.2025 09:16 β€” πŸ‘ 0    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Post image

Breaking up-to-date Windows 11 BitLocker encryption -- on-device but software-only : neodyme.io/en/blog/bitl...

17.05.2025 09:04 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
ETH Zurich researchers discover new security vulnerability in Intel processors Computer scientists at ETH Zurich discover new class of vulnerabilities in Intel processors, allowing them to break down barriers between different users of a processor using carefully crafted instruc...

Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks : ethz.ch/en/news-and-...

Ref :

*Speculative calculations open a backdoor to information theft (*2022) : ethz.ch/en/news-and-...

RETBLEED : www.usenix.org/system/files...

17.05.2025 08:47 β€” πŸ‘ 5    πŸ” 1    πŸ’¬ 0    πŸ“Œ 1
Preview
Mastering Rate Limit Bypass Techniques Learn How Hackers Bypass Rate Limitsβ€Šβ€”β€Šand How You Can Too

Mastering Rate Limit Bypass Techniques : infosecwriteups.com/mastering-ra...

17.05.2025 08:22 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Hacking Casino | How Math Beats the Casino Odds
YouTube video by Sumsub Hacking Casino | How Math Beats the Casino Odds

Hacking Casino - How Math Beats the Casino Odds : www.youtube.com/watch?v=87Fg...

Shuffle Up and Deal: Analyzing the Security of Automated Card Shufflers : i.blackhat.com/BH-US-23/Pre...

How To Rob a Casino : 0x00sec.org/t/how-to-rob...

17.05.2025 08:19 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Writing a Self-Mutating Malware This topic was automatically closed after 121 days. New replies are no longer allowed.

Writing a Self-Mutating Malware : 0x00sec.org/t/writing-a-...

Metamorphic Code Examples : stackoverflow.com/questions/10...

17.05.2025 07:29 β€” πŸ‘ 3    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
How To Rob a Casino Casinos, some view these places as something that corrupts the soul, leading individuals astray with the allure of easy money and instant gratification. Others see casinos as an escape from reality, s...

How To Rob a Casino : 0x00sec.org/t/how-to-rob...

17.05.2025 07:26 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
macOS Malware Development II Today’s post is about writing fully custom malware targeting macOS. We’ll walk through its architecture, mutation techniques, and anti-analysis methods, with a focus on Mach-O internals and Darwin AP...

macOS Malware Development (Part 2) : 0x00sec.org/t/macos-malw...

Part 1 : 0x00sec.org/t/macos-malw...

Ref :

Inside a Hello World executable on OS X : adrummond.net/posts/macho

The Mystery of Mach-O Object Structure : alexdremov.me/mystery-of-m...

www2.cs.arizona.edu/~collberg/Te...

17.05.2025 07:20 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

Fuzzing Windows ARM64 closed-source binary : www.romainthomas.fr/post/25-04-w...

17.05.2025 06:15 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image Post image Post image

Litterbox : Sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment : github.com/BlackSnufkin...

17.05.2025 06:03 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Pupkin: A Simple .NET Info-Stealer Exfiltrating Data via Telegram Pupkin Stealer is a deceptively simple .NET-based stealer designed to harvest browser passwords, Discord tokens, and Telegram sessions β€” all controlled silently through a Telegram C2.

Pupkin : a deceptively simple .NET-based stealer designed to harvest browser passwords, Discord tokens, and Telegram sessions β€” all controlled silently through a Telegram C2 : muff-in.github.io/blog/pupkin-...

02.05.2025 16:25 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

Linux running in Excel : github.com/NSG650/Linux...

02.05.2025 15:46 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
GitHub - OFFTKP/felix86: Run x86-64 programs on RISC-V Linux Run x86-64 programs on RISC-V Linux. Contribute to OFFTKP/felix86 development by creating an account on GitHub.

felix86 : Run x86-64 programs on RISC-V Linux : github.com/OFFTKP/felix86

02.05.2025 15:37 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Home

LigerLabs - Educational Modules for (Anti-)Reverse Engineering : ligerlabs.org

01.05.2025 15:53 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

Attacking My Landlord's Boiler : blog.videah.net/attacking-my...

01.05.2025 15:51 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How I Found Malware in a BeamNG Mod An analysis using Process Monitor and WinDbg, dealing with JavaScript, WASM, and Windows shellcode.

How I Found Malware in a BeamNG Mod : lemonyte.com/blog/beamng-...

01.05.2025 15:46 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
How I made $64k from deleted filesβ€Šβ€”β€Ša bug bounty story TL;DRβ€Šβ€”β€ŠI built an automation that cloned and scanned tens of thousands of public GitHub repos for leaked secrets. For each repository I…

How I made $64k from deleted files β€” a bug bounty story : medium.com/@sharon.briz...

01.05.2025 15:44 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
How a Single Line Of Code Could Brick Your iPhone | Rambo Codes Gui Rambo writes about his coding and reverse engineering adventures.

How a Single Line Of Code Could Brick Your iPhone : rambo.codes/posts/2025-0...

01.05.2025 15:39 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Video thumbnail

AirBorne : Wormable Zero-Click RCE in Apple AirPlay Puts Billions of Devices at Risk : www.oligo.security/blog/airborne

01.05.2025 15:37 β€” πŸ‘ 1    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0