In Transactional Memory, No One Can Hear You Scream: Attacking Intel's Transactional Synchronization Extensions http://blog.ret2.io/2019/06/26/attacking-intel-tsx/ #exploitation #dukeBarman
RET2 Systems Blog
In Transactional Memory, No One Can Hear You Scream
Over the past several years, we have watched the Capture The Flag circuit mature in both complexity and creativity. The best CTF’s strive to push the envelop...
IDAPyHelper is a script for the Interactive Disassembler that helps writing IDAPython scripts and plugins. https://github.com/patois/IDAPyHelper #ida #reverse #dukeBarman
GitHub
GitHub - patois/IDAPyHelper: IDAPyHelper is a script for the Interactive Disassembler that helps writing IDAPython scripts and…
IDAPyHelper is a script for the Interactive Disassembler that helps writing IDAPython scripts and plugins. - patois/IDAPyHelper
List of Plugins and Scripts written for the reverse engineering platform - Cutter https://github.com/radareorg/cutter-plugins #radare2 #reverse #dukeBarman
GitHub
GitHub - rizinorg/cutter-plugins: A curated list of Community Plugins and Scripts written for Cutter
A curated list of Community Plugins and Scripts written for Cutter - rizinorg/cutter-plugins
Burp Suite Pro/Community 2.1 STABLE released http://releases.portswigger.net/2019/06/professional-community-edition-21.html #web #dukeBarman
Burp Suite Release Notes
Professional / Community 2.1
Burp Suite 2.x is now officially out of beta! This is a huge upgrade over 1.7 with a wealth of new capabilities. We encourage anyone still using 1.7 to switch to 2.x. Community Edition users can now e
Reverse Engineering Broadcom NIC BCM5719 Firmware
- Write-up: https://www.devever.net/~hl/ortega
- Project Ortega: https://github.com/hlandau/ortega
- BCM5719 Firmware Reimplementation: https://github.com/meklort/bcm5719-fw
#hardware #reverse #dukeBarman
- Write-up: https://www.devever.net/~hl/ortega
- Project Ortega: https://github.com/hlandau/ortega
- BCM5719 Firmware Reimplementation: https://github.com/meklort/bcm5719-fw
#hardware #reverse #dukeBarman
GitHub
GitHub - hlandau/ortega: Ortega FDK
Ortega FDK. Contribute to hlandau/ortega development by creating an account on GitHub.
People finished reverse engineering of 1801VM2 using actual die pics: https://github.com/1801BM1/cpu11/tree/master/vm2 #reverse #hardware #dukeBarman
GitHub
cpu11/vm2 at master · 1801BM1/cpu11
Revengineered ancient PDP-11 CPUs, originals and clones - 1801BM1/cpu11
Введение в реверсинг с нуля, с использованием IDA PRO https://habr.com/en/post/458354/ #reverse #ida
Habr
Введение в реверсинг с нуля, с использованием IDA PRO
Привет, Хабравчане! Для тех, кто не знает, в своё время я взял на себя ответственность перевести испанский курс Introduccion Al Reversing Con Ida Pro Desde Cero под авторством Ricardo Narvaja на...
Robbinhood Malware Analysis with Radare2 https://goggleheadedhacker.com/blog/post/12 #malware #radare2 #dukeBarman
GoggleHeadedHacker
Robbinhood Malware Analysis with Radare2
Learn how to reverse engineer golang malware using Radare2. This article will explain how the gopclntab works and how we can use it to extract function names. This process is explained using the Robbinhood Ransomware that attacked Baltimore.
Reverse engineering the Validity 138a:0091 fingerprint sensor (Dell XPS 15/13 2016-2017 9X50 and 9X60) https://github.com/hmaarrfk/Validity91 #reverse #hardware #dukeBarman
GitHub
GitHub - hmaarrfk/Validity91: Reverse engineering the Validity 138a:0091 fingerprint sensor (Dell XPS 15/13 2016-2017 9X50 and…
Reverse engineering the Validity 138a:0091 fingerprint sensor (Dell XPS 15/13 2016-2017 9X50 and 9X60) - hmaarrfk/Validity91
Scripts and cheatsheets for IDAPython
https://github.com/inforion/idapython-cheatsheet #re #idapro #ida #p_rusanov
https://github.com/inforion/idapython-cheatsheet #re #idapro #ida #p_rusanov
GitHub
GitHub - inforion/idapython-cheatsheet: Scripts and cheatsheets for IDAPython
Scripts and cheatsheets for IDAPython. Contribute to inforion/idapython-cheatsheet development by creating an account on GitHub.
Framework for testing any Anti-Cheat https://github.com/niemand-sec/AntiCheat-Testing-Framework #reverse #dukeBarman
GitHub
GitHub - niemand-sec/AntiCheat-Testing-Framework: Framework to test any Anti-Cheat
Framework to test any Anti-Cheat. Contribute to niemand-sec/AntiCheat-Testing-Framework development by creating an account on GitHub.
Source code for Hexext was released! Hexext is a plugin for extending Hexrays 7.0 via microcode. It makes code prettier.
Info: https://forum.reverse4you.org/t/hexext-source-release-the-return-of-the-hex/10675
Github: https://github.com/chrisps/Hexext
#re #idapro #plugin #source #darw1n
Info: https://forum.reverse4you.org/t/hexext-source-release-the-return-of-the-hex/10675
Github: https://github.com/chrisps/Hexext
#re #idapro #plugin #source #darw1n
R0 CREW
Hexext source release - The Return of the Hex
The repo also contains new releases, which may be unstable as I havent tested much. Before is to the left, after is to the right It’s still super messy, I’ve just kinda given up on making it less messy for now. Documentation isn’t that great either.…
A new #VSCode extension by https://twitter.com/fudgepop01 that allows smart hex viewer & dissection of various binary streams based on #KaitaiStruct tech stack https://www.youtube.com/watch?v=4c7UuZ33JYE #reverse #dukeBarman
X (formerly Twitter)
Fudgepop01 (@fudgepop01) on X
Acc locked due to ez thieft features | 26 | P+ Tinkerer | he/him | pfp: @rolo_stuff; banner: @great9star Jobs: - @ChronoGearDev; @StudiosofAether
Analyzing malware obfuscation & emulation http://www.blackstormsecurity.com/docs/DEFCON_CHINA_ALEXANDRE.pdf #malware #radare2 #reverse #dukeBarman
Forwarded from 2600 Qazaqstan
Приглашаем вас в группу, которая является "официальным" чатом форума r0 Crew в Казахстане!
Группа объединяет определенный круг людей, заинтересованных в: поиске, изучении уязвимостей и ошибок в программном коде; исследовании навесных защит; исследовании вирусов; системном программировании (kernel-mode, user-mode).
Список тем:
0. Технические темы (ctf, веб, реверс).
1. Помощь советами и рекомендациями.
2. Свободное общение на разные темы.
Ласкаво просимо && Қош келдіңіздер!
https://xn--r1a.website/r0crewKZ
Группа объединяет определенный круг людей, заинтересованных в: поиске, изучении уязвимостей и ошибок в программном коде; исследовании навесных защит; исследовании вирусов; системном программировании (kernel-mode, user-mode).
Список тем:
0. Технические темы (ctf, веб, реверс).
1. Помощь советами и рекомендациями.
2. Свободное общение на разные темы.
Ласкаво просимо && Қош келдіңіздер!
https://xn--r1a.website/r0crewKZ
Videos from Global AppSec Tel Aviv 2019 https://www.youtube.com/playlist?list=PLpr-xdpM8wG9Pl8MLCdkU1Dq34Cl0NPOc #conference #video #dukeBarman
Videos from OFFZONE MOSCOW 2019 were uploaded. Enjoy! https://www.youtube.com/channel/UCv-eZGMbMt-L6nHabgUasHQ #conference #videos #dukeBarman
Exploiting Buffer Overflows on RISC-V https://www.youtube.com/watch?v=uBhaw49qooE #exploitation #dukeBarman
YouTube
Exploiting Buffer Overflows on RISC-V - Christina Quast, None
Join us for Kubernetes Forums Seoul, Sydney, Bengaluru and Delhi - learn more at kubecon.io
Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference…
Don't miss KubeCon + CloudNativeCon 2020 events in Amsterdam March 30 - April 2, Shanghai July 28-30 and Boston November 17-20! Learn more at kubecon.io. The conference…