JNIEnv-translate recovers the offset used to access a function in JNIEnv and translates that into the corresponding function https://github.com/maddiestone/IDAPythonEmbeddedToolkit/blob/master/Android/jni_translate.py #android #ida #dukeBarman
GitHub
IDAPythonEmbeddedToolkit/Android/jni_translate.py at master · maddiestone/IDAPythonEmbeddedToolkit
IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices - maddiestone/IDAPythonEmbeddedToolkit
Our forum and community is 10 years old! With which we sincerely congratulate everyone from our community! Thank you for staying with us! We are very grateful to you! 🍻
Открыта регистрация и поиск докладов на 34 встречу DEFCON Russia - DCG#7812 и 4 ежегодный кораблик! Подробности: https://defcon-russia.ru/ru/2019/07/%D0%B2%D1%81%D1%82%D1%80%D0%B5%D1%87%D0%B0-4.8.2019/ #conference
defcon-russia.ru
Встреча 4.8.2019
Basic BIOS emulator for Unicorn Engine. https://github.com/macmade/unicorn-bios #hardware #dukeBarman
GitHub
GitHub - macmade/unicorn-bios: Basic BIOS emulator for Unicorn Engine.
Basic BIOS emulator for Unicorn Engine. Contribute to macmade/unicorn-bios development by creating an account on GitHub.
All videos from "Objective by the Sea, v2.0" were uploaded https://www.youtube.com/playlist?list=PLliknDIoYszvTDaWyTh6SYiTccmwOsws8 #conference #obts #dukeBarman
#ZeroNights 2019 CFP is OPEN: Offensive and defensive research (15/30/45min). Submit your talk! (link: https://01x.cfp.zeronights.ru/zn2019/) 01x.cfp.zeronights.ru/zn2019/ #conference #ZN #dukeBarman
#ZeroNights 2019 CFP is OPEN: Offensive and defensive research (15/30/45min). Submit your talk! 01x.cfp.zeronights.ru/zn2019/ #conference #ZN #dukeBarman
libdft: Practical Dynamic Data Flow Tracking https://github.com/AngoraFuzzer/libdft64 #pin #reverse #dukeBarman
GitHub
GitHub - AngoraFuzzer/libdft64: libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)
libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis) - AngoraFuzzer/libdft64
An Introduction To Code Analysis With Ghidra https://threatvector.cylance.com/en_us/home/an-introduction-to-code-analysis-with-ghidra.html #ghidra #reverse #newbie #dukeBarman
BlackBerry
Code Analysis With Ghidra: An Introduction
Ghidra is a free software reverse-engineering framework developed by the NSA and released as open-source software. Learn how to use Ghidra to perform malicious code analysis.
RPC_SERVER_INTERFACE parser for Ghidra https://blog.sektor7.net/#!res/2019/RPC-parser.md #ghidra #reverse #dukeBarman
blog.sektor7.net
SEKTOR7 Research Blog
malware development, malware development course, offensive code development, offensive coding, offcoding, red team operator, red teaming, blue team, blog
Update for #Ghidra building docker image: https://github.com/dukebarman/ghidra-builder Now you can build this from host's source folder. #reverse #dukeBarman
GitHub
GitHub - dukebarman/ghidra-builder: Docker image for building ghidra RE framework from source
Docker image for building ghidra RE framework from source - dukebarman/ghidra-builder
Collin Mulliner released the FwAnalyzer, a tool for automated review of firmware images, at #Blackhat 2019 https://github.com/cruise-automation/fwanalyzer #reverse #hardware #dukeBarman
GitHub
GitHub - cruise-automation/fwanalyzer: a tool to analyze filesystem images for security
a tool to analyze filesystem images for security. Contribute to cruise-automation/fwanalyzer development by creating an account on GitHub.
Arm IDA and Cross Check: Reversing the Boeing 787's Core Network https://i.blackhat.com/USA-19/Wednesday/us-19-Santamarta-Arm-IDA-And-Cross-Check-Reversing-The-787-Core-Network.pdf #reverse #hardware #blackhat #dukeBarman
Attacking iPhone XS Max https://i.blackhat.com/USA-19/Thursday/us-19-Wang-Attacking-IPhone-XS-Max.pdf #exploit #blackhat #ios #dukeBarman
Building a custom malware sandbox with PANDA - Part 1 https://adalogics.com/blog/Building-a-custom-malware-sandbox-with-PANDA-Part-1 #reverse #malware #dukeBarman
A set of tools able to transform hardware execution traces into formats more suitable for integration into other tools https://github.com/lse/wakare #reverse #radare2 #binaryninja #dukeBarman
GitHub
GitHub - lse/wakare: experimentation/code from Tanguy Dubroca (summer 2019)
experimentation/code from Tanguy Dubroca (summer 2019) - lse/wakare
Paged Out! #1 is out! (It is a new experimental (one article == one page) free magazine about programming, hacking, security hacking, and other similar topics from famous hackers). https://pagedout.institute/?page=issues.php #ezine #PagedOut #dukeBarman
#ScrewedDrivers: Common Design Flaw In Dozens (40+) of Device Drivers Allows Widespread Windows Compromise https://eclypsium.com/wp-content/uploads/2019/08/DEFCON-27-Get-off-the-kernel-if-you-cant-drive.pdf #hardware #exploit #dukeBarman
Modern Debugging with WinDbg Preview https://github.com/hugsy/defcon_27_windbg_workshop/ #debugger #defcon #windbg #dukeBarman
GitHub
GitHub - hugsy/defcon_27_windbg_workshop: DEFCON 27 workshop - Modern Debugging with WinDbg Preview
DEFCON 27 workshop - Modern Debugging with WinDbg Preview - hugsy/defcon_27_windbg_workshop
Software Reverse Engineering with Ghidra (C++ mostly) https://www.youtube.com/playlist?list=PLRAe18TJ_NTE9cr18OPphn82WS8gVv-te #ghidra #reverse #video #dukeBarman