"Visual Basic 5/6 compiler memory leak inside created executable files" https://sysenter-eip.github.io/VBParser #exploit #dukeBarman
axi0mX introduced update for own utility ipwndfu (open-source jailbreaking tool for older iOS devices) with new exploit - checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for most iOS devices (A5-A11 chip) #exploit #ios #dukeBarman
GitHub
GitHub - axi0mX/ipwndfu: open-source jailbreaking tool for many iOS devices
open-source jailbreaking tool for many iOS devices - axi0mX/ipwndfu
Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer (interview with axi0mX) https://arstechnica.com/information-technology/2019/09/developer-of-checkm8-explains-why-idevice-jailbreak-exploit-is-a-game-changer/ #exploit #ios #dukeBarman
Ars Technica
Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer
Unpatchable vulnerability is a game-changer that even Apple will be unable to stop.
#ZeroNights 2019 HackQuest starts on October 6 https://hackquest.zeronights.org/! ZeroNights HackQuest is a hacking challenge before the annual ZeroNights conference. The goal is to solve tasks related to information security, including reverse engineering, web, mobile hacking, penetration testing, and more. Details: https://zeronights.ru/news-en/zeronights-hackquest-starts-on-october-6-2019/ #CTF #dukeBarman
Cutter: Presenting r2ghidra Decompiler https://www.youtube.com/watch?v=eHtMiezr7l8 #reverse #ghidra #radare2 #r2con #dukeBarman
YouTube
Cutter: Presenting r2ghidra Decompiler | r2con 2019
Slides: https://github.com/radareorg/r2con2019/raw/master/talks/cutter/cutter-r2con2019.pdf
By: Antide Petit, Itay Cohen (Check Point Research), Florian Märkl
Cutter is a powerful open-source, multi-platform GUI that is powered by radare2. Cutter was created…
By: Antide Petit, Itay Cohen (Check Point Research), Florian Märkl
Cutter is a powerful open-source, multi-platform GUI that is powered by radare2. Cutter was created…
[RU] Exploit writing tutorial part 11: Heap Spraying Demystified [Перевод: dirtyharry]
https://forum.reverse4you.org/t/exploit-writing-tutorial-part-11-heap-spraying-demystified-dirtyharry/10832
#re #expdev #tutorial #heapspray #darw1n
https://forum.reverse4you.org/t/exploit-writing-tutorial-part-11-heap-spraying-demystified-dirtyharry/10832
#re #expdev #tutorial #heapspray #darw1n
[RU] OTUS (Курс по реверсу) #LEAKED
https://cloud.mail.ru/public/4aGL/3EFRUMvq6/
#re #course #Thatskriptkid
https://cloud.mail.ru/public/4aGL/3EFRUMvq6/
#re #course #Thatskriptkid
Videos about #Ghidra using by 0x6d696368 https://www.youtube.com/playlist?list=PLXqdTlog3E_8Ucym6klVOY9RmjdIy3cbm #videos #reverse #dukeBarman
YouTube
Ghidra
Videos about Ghidra.
Android OWASP crackmes: Write-up UnCrackable Level 2 https://enovella.github.io/android/reverse/2017/05/20/android-owasp-crackmes-level-2.html #radare2 #frida #android #dukeBarman
Computer Issues
Android OWASP crackmes: Write-up UnCrackable Level 2
Computer Issues by Eduardo Novella
Ida Pro debug + OpenOCD attached to an iPhone with a Bonobo Cable using checkm8 exploit https://www.youtube.com/watch?v=wYQDlP--glU #ios #ida #dukeBarman
YouTube
Ida Pro debug + OpenOCD attached to an iPhone with a Bonobo Cable using checkm8 exploit
Ida Pro debug + OpenOCD attached to an iPhone with a Bonobo Cable using checkm8 exploit
In this video we demo how to use IDA pro debug mode on iphone SecureRom
In this video we demo how to use IDA pro debug mode on iphone SecureRom
Code obFU(N)scation mixing 32 and 64 bit mode instructions https://scrammed.blogspot.com/2014/10/code-obfunscation-mixing-32-and-64-bit.html #obfuscation #dukeBarman
Blogspot
Code obFU(N)scation mixing 32 and 64 bit mode instructions
1 - Introduction This article is about a funny way to obfuscate code that takes advantage of the Windows 64bit capability to manage an...
Zydis v3.0 is now final! https://github.com/zyantific/zydis/releases/tag/v3.0.0 #reverse #dukeBarman
GitHub
Release v3.0.0 · zyantific/zydis
Detailed changelog (since v2.0.3)
Decoder
Improved legacy prefix decoding
Fixed gather register check for VGATHERPF0{D|Q}{PS|PD} instruction
Fixed some incorrect assert conditions
Fixed check for ...
Decoder
Improved legacy prefix decoding
Fixed gather register check for VGATHERPF0{D|Q}{PS|PD} instruction
Fixed some incorrect assert conditions
Fixed check for ...
Patch Diffing with Ghidra: Using Version Tracking to Diff a LibPNG Update https://blog.threatrack.de/2019/10/02/ghidra-patch-diff/ #ghidra #reverse #dukeBarman
blog.threatrack.de
Patch Diffing with Ghidra
Carving bins - how to use #radare2 to extract some ELFs files from a raw dump http://radare.today/posts/carving-bins/ #reverse #dukeBarman
RomHack #CTF 2019 "babysh" - Defeating ASLR w/ Partial Overwrite https://www.youtube.com/watch?v=v-7Ibom0Gyo #reverse #radare2 #dukeBarman
YouTube
#9 - RomHack CTF 2019 "babysh" - Defeating ASLR w/ Partial Overwrite
Links
pwnapi: https://github.com/ndaprela/pwnapi
Vagrant box conf files: https://github.com/ndaprela/vagrant
Music
"Ice Flow" Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0
https://www.youtube.com/redirect?redir_…
pwnapi: https://github.com/ndaprela/pwnapi
Vagrant box conf files: https://github.com/ndaprela/vagrant
Music
"Ice Flow" Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0
https://www.youtube.com/redirect?redir_…
"IDA, I Think It’s Time You And I Had a Talk: Controlling IDA Pro With Voice Control Software" Article: https://www.fireeye.com/blog/threat-research/2019/10/controlling-ida-pro-with-voice-control-software.html Source: https://github.com/fireeye/IDA_Pro_VoiceAttack_profile #reverse #ida #dukeBarman
GitHub
GitHub - mandiant/IDA_Pro_VoiceAttack_profile
Contribute to mandiant/IDA_Pro_VoiceAttack_profile development by creating an account on GitHub.