CPP+Dynamic+Type+Recovery.pdf
1.1 MB
Automation Techniques in C++ Reverse Engineering https://www.msreverseengineering.com/blog/2019/8/5/automation-techniques-in-c-reverse-engineering #re #cpp #darw1n
Radare2, IDA Pro, and Binary ninja, a metaphoric comparison https://dustri.org/b/radare2-ida-pro-and-binary-ninja-a-metaphoric-comparison.html #radare2 #IDA #binaryninja #reverse #dukeBarman
16-20 сентября, в Самаре, пройдет финал уже традиционного крупнейшего международного оффлайн CTF-соревнования #VolgaCTF.
Помимо самого соревнования планируются лекции, от экспертов ИБ из крупнейших компаний России, Бельгии и Румынии.
Вход свободный, рекомендуем к посещению!
https://xn--r1a.website/volgactf ⬅️
#ctf #events
Помимо самого соревнования планируются лекции, от экспертов ИБ из крупнейших компаний России, Бельгии и Румынии.
Вход свободный, рекомендуем к посещению!
https://xn--r1a.website/volgactf ⬅️
#ctf #events
Канал с вакансиями от форума r0 и сайта hh.ru.
Тематика: Reverse Engineering, Malware Research, Pentest.
В дальнейшем, вероятно, появится информация еще и с зарубежных ресурсов. Все что будет касаться "удалённой работы" и "релокации".
https://xn--r1a.website/r0_jobs
#job #cv #vacancy
Тематика: Reverse Engineering, Malware Research, Pentest.
В дальнейшем, вероятно, появится информация еще и с зарубежных ресурсов. Все что будет касаться "удалённой работы" и "релокации".
https://xn--r1a.website/r0_jobs
#job #cv #vacancy
Telegram
r0 Crew (Jobs, BETA)
Security Related Tasks💰:
- Reverse Engineering;
- Malware Research;
- Pentest;
- etc;
Join to chat: @r0crew_bot
You can create a task in the forum here: https://forum.reverse4you.org/t/about-the-one-time-work-category
Then it will appear on the channel
- Reverse Engineering;
- Malware Research;
- Pentest;
- etc;
Join to chat: @r0crew_bot
You can create a task in the forum here: https://forum.reverse4you.org/t/about-the-one-time-work-category
Then it will appear on the channel
Канал с разовыми оплачиваемыми задачами с форума r0. Позже, вероятно, подвяжем и другие форумы.
https://xn--r1a.website/joinchat/AAAAAFIVdiqMn_Pv9vVE0A
#job #tasks
https://xn--r1a.website/joinchat/AAAAAFIVdiqMn_Pv9vVE0A
#job #tasks
Telegram
r0 Crew (Jobs, BETA)
Security Related Tasks💰:
- Reverse Engineering;
- Malware Research;
- Pentest;
- etc;
Join to chat: @r0crew_bot
You can create a task in the forum here: https://forum.reverse4you.org/t/about-the-one-time-work-category
Then it will appear on the channel
- Reverse Engineering;
- Malware Research;
- Pentest;
- etc;
Join to chat: @r0crew_bot
You can create a task in the forum here: https://forum.reverse4you.org/t/about-the-one-time-work-category
Then it will appear on the channel
Dynamic Instrumentation: Frida And r2frida For Noobs https://bananamafia.dev/post/r2frida-1/ #radare2 #reverse #frida #dukeBarman
SVD-Loader for Ghidra: Simplifying bare-metal ARM reverse engineering https://github.com/leveldown-security/SVD-Loader-Ghidra #reverse #ghidra #dukeBarman
GitHub
GitHub - leveldown-security/SVD-Loader-Ghidra
Contribute to leveldown-security/SVD-Loader-Ghidra development by creating an account on GitHub.
A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU https://github.com/andreafioraldi/WineAFLplusplusDEMO #fuzzing #dukeBarman
GitHub
GitHub - AFLplusplus/Fuzz-With-Wine-Demo: A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU
A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU - AFLplusplus/Fuzz-With-Wine-Demo
Frida 12.7 is out with a brand new CModule API, and ~100x faster ObjC.choose()
https://frida.re/news/2019/09/18/frida-12-7-released/ #re #mobile #darw1n
https://frida.re/news/2019/09/18/frida-12-7-released/ #re #mobile #darw1n
Frida • A world-class dynamic instrumentation toolkit
Frida 12.7 Released
Observe and reprogram running programs on Windows, macOS, GNU/Linux, iOS, watchOS, tvOS, Android, FreeBSD, and QNX
Extracting type-information from a Go binary
https://lekstu.ga/posts/extracting-go-types/
#golang #internals #darw1n
https://lekstu.ga/posts/extracting-go-types/
#golang #internals #darw1n
CVE-2019-8038 & CVE-2019-8039 : Details about vulns in Adobe Acrobat/Reader
https://starlabs.sg/advisories/19-8038/
https://starlabs.sg/advisories/19-8039/
#re #uaf #expdev #darw1n
https://starlabs.sg/advisories/19-8038/
https://starlabs.sg/advisories/19-8039/
#re #uaf #expdev #darw1n
Automatic Hooking/Patching for Spotify on MacOS
https://medium.com/swlh/skiptracing-automated-hook-resolution-74eda756533d
#re #hook #capstone #ida #darw1n
https://medium.com/swlh/skiptracing-automated-hook-resolution-74eda756533d
#re #hook #capstone #ida #darw1n
Medium
Skiptracing: Automated Hook Resolution
This post is the third part of my series about tracking skips in the Spotify client. This post is a direct continuation of my work on the…
Hey, friends! We have good news. Many of you have been waiting for this for a long time. Finally, we had opened the English speak only chat:
https://xn--r1a.website/r0_chat ⬅️
#english #community
https://xn--r1a.website/r0_chat ⬅️
#english #community
Malware Analysis 101 - Basic Static Analysis https://medium.com/bugbountywriteup/malware-analysis-101-basic-static-analysis-db59119bc00a #malware #reverse #dukeBarman
Medium
Malware Analysis 101 - Basic Static Analysis
A continuation of my previous write-up “Malware Analysis 101”, this explains the basic of Basic Static Malware Analysis.
"Visual Basic 5/6 compiler memory leak inside created executable files" https://sysenter-eip.github.io/VBParser #exploit #dukeBarman
axi0mX introduced update for own utility ipwndfu (open-source jailbreaking tool for older iOS devices) with new exploit - checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for most iOS devices (A5-A11 chip) #exploit #ios #dukeBarman
GitHub
GitHub - axi0mX/ipwndfu: open-source jailbreaking tool for many iOS devices
open-source jailbreaking tool for many iOS devices - axi0mX/ipwndfu
Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer (interview with axi0mX) https://arstechnica.com/information-technology/2019/09/developer-of-checkm8-explains-why-idevice-jailbreak-exploit-is-a-game-changer/ #exploit #ios #dukeBarman
Ars Technica
Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer
Unpatchable vulnerability is a game-changer that even Apple will be unable to stop.