find and decode all MSR/VMCS codes inside binary files https://github.com/RceNinja/Re-Scripts #reverse #ida #dukeBarman
GitHub
GitHub - RceNinja/Re-Scripts
Contribute to RceNinja/Re-Scripts development by creating an account on GitHub.
The story of Adobe Reader symbols
https://googleprojectzero.blogspot.com/2019/10/the-story-of-adobe-reader-symbols.html
#re #expdev #darw1n
https://googleprojectzero.blogspot.com/2019/10/the-story-of-adobe-reader-symbols.html
#re #expdev #darw1n
Blogspot
The story of Adobe Reader symbols
Posted by Mateusz Jurczyk, Project Zero Modern day security analysis of client applications is often hindered by the inaccessibility of ...
Tool for PDB generation from IDA Pro database https://github.com/Mixaill/FakePDB #reverse #ida #dukeBarman
GitHub
GitHub - Mixaill/FakePDB: Tool for PDB generation from IDA Pro database
Tool for PDB generation from IDA Pro database. Contribute to Mixaill/FakePDB development by creating an account on GitHub.
IDA Pro plugin for TileGX support https://blog.talosintelligence.com/2019/10/new-ida-pro-plugin-provides-tilegx.html #ida #dukeBarman
Cisco Talos Blog
New IDA Pro plugin provides TileGX support
Talos intelligence and world-class threat research team better protects you and your organization against known and emerging cybersecurity threats.
#ghidra plugin for easy patch diffing source: https://github.com/threatrack/ghidra-patchdiff-correlator article: https://blog.threatrack.de/2019/10/10/ghidra-correlator/ #reverse #dukeBarman
GitHub
GitHub - threatrack/ghidra-patchdiff-correlator: This project tries to provide additional Ghidra Version Tracking Correlators suitable…
This project tries to provide additional Ghidra Version Tracking Correlators suitable for patch diffing. - threatrack/ghidra-patchdiff-correlator
#Ghidra Processor for the Play Station 2's Emotion Engine MIPS based CPU https://github.com/beardypig/ghidra-emotionengine #reverse #dukeBarman
GitHub
GitHub - beardypig/ghidra-emotionengine: Ghidra Processor for the Play Station 2's Emotion Engine MIPS based CPU
Ghidra Processor for the Play Station 2's Emotion Engine MIPS based CPU - beardypig/ghidra-emotionengine
#IDA 7.4 released (Hi, Python3!) https://www.hex-rays.com/products/ida/7.4/index.shtml Hex-Rays v7.4 Decompiler Comparison Page: https://www.hex-rays.com/products/decompiler/v74_vs_v73.shtml #reverse #dukeBarman
ZeroNights 2019 HackQuest completed on October 13. It’s time to announce winners (Twitter handles):
Day 1: _vladvis
Day 2: torn
Day 3: black2fan
Day 4: AV1ct0r
Day 5: vos
Day 6: gittgudd
Day 7: sysenter_eip
The names of the tasks and their authors are listed below.
Day 1: “Top Secret” (by Digital Security)
Day 2: “Microsoft Lunix” (by r0Crew)
Day 3: “House of Beched” (by Beched — deteact)
Day 4: “ASR-EHD” (by Digital Security)
Day 5: “Protected Shell” (by RuCTFE)
Day 6: “Unlock” (by Volga CTF)
Day 7: “Beep Beep!” (by School CTF)
Details: https://zeronights.ru/news-en/the-results-of-zeronights-2019-hackquest/
See you at #ZeroNights!
Day 1: _vladvis
Day 2: torn
Day 3: black2fan
Day 4: AV1ct0r
Day 5: vos
Day 6: gittgudd
Day 7: sysenter_eip
The names of the tasks and their authors are listed below.
Day 1: “Top Secret” (by Digital Security)
Day 2: “Microsoft Lunix” (by r0Crew)
Day 3: “House of Beched” (by Beched — deteact)
Day 4: “ASR-EHD” (by Digital Security)
Day 5: “Protected Shell” (by RuCTFE)
Day 6: “Unlock” (by Volga CTF)
Day 7: “Beep Beep!” (by School CTF)
Details: https://zeronights.ru/news-en/the-results-of-zeronights-2019-hackquest/
See you at #ZeroNights!
Introduction to the Intel Management Engine OS (series) https://pbx.sh/intelme-sw1/ #intel #reverse #me #dukeBarman
Peter Bosch’s website
Introduction to the Intel Management Engine OS (Part 1)
Examining the ME firmware version 11.0
Assembled Labeled Library for Static Analysis Research (only slides yet) https://github.com/JHUAPL/ALLSTAR #reverse #dukeBarman
GitHub
GitHub - JHUAPL/ALLSTAR: Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing…
Assembled Labeled Library for Static Analysis Research - Debian packages built for 6 architectures, storing compiler artifacts, binaries and symbols - GitHub - JHUAPL/ALLSTAR: Assembled Labeled L...
CTFZone 2019 (http://ctftime.org/event/894) jeopardy-style online quals start on November 30 and will last for 36 hours. Hurry up to register, and find out more about the rules http://ctf.bi.zone! #CTF #dukeBarman
ctftime.org
CTFZone 2019 Quals
BI.ZONE is ready to announce the date of CTFZone quals 2019!
The first online stage will take place on November 30 a...
The first online stage will take place on November 30 a...
RSoC 2019 Final: Console Interface Improvements https://radareorg.github.io/blog/posts/rsoc-2019-console-interface-improvement/ #radare2 #reverse #dukeBarman
radareorg.github.io
RSoC 2019 Final: Console Interface Improvements
RSoC 2019 Final: Console Interface Improvements Introduction: Hello all, I’m deepakchethan from India. I got to work on the console interface improvements for radare2 as a part of 2019’s edition of Radare Summer of Code. My main task was to improve the terminal…
Extract labels from IDA .lst or Ghidra .csv file and export x64dbg database https://github.com/utkonos/lst2x64dbg #reverse #ghidra #radare2 #dukeBarman
GitHub
GitHub - utkonos/lst2x64dbg: Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including…
Extract labels from IDA, Ghidra, Binary Ninja, and Relyze files and export x64dbg database. Including radare2 main address. - utkonos/lst2x64dbg
ZeroNights Hackquest 2019. Results & Writeups
https://habr.com/ru/company/dsec/blog/472416/
#re #web #writeup #darw1n
https://habr.com/ru/company/dsec/blog/472416/
#re #web #writeup #darw1n
Хабр
ZeroNights Hackquest 2019. Results & Writeups
Совсем недавно завершился ежегодный HackQuest, приуроченный к конференции ZeroNights. Как и в прошлые годы, участникам предстояло решить 7 различных заданий — по одному на сутки квеста. Задания,...
ZeroNights HackQuest: Micosoft Linux (How to Solve):
https://github.com/icecube27/ctf-writeups/tree/master/2019/Zeronights-Hackquest/micosoft-linux
#re #writeup #darw1n
https://github.com/icecube27/ctf-writeups/tree/master/2019/Zeronights-Hackquest/micosoft-linux
#re #writeup #darw1n
GitHub
ctf-writeups/2019/Zeronights-Hackquest/micosoft-linux at master · icecube27/ctf-writeups
Contribute to icecube27/ctf-writeups development by creating an account on GitHub.
🔥 OFFZONE 2020 — April 16-17, Moscow, Russia. Save the date!
Call for Papers is now officially open — get your talk proposals submitted.
https://offzone.moscow/2020-call-for-papers/
Make sure to check out Speaker Benefits and CFP Principles.
See you at OFFZONE 2020!
Call for Papers is now officially open — get your talk proposals submitted.
https://offzone.moscow/2020-call-for-papers/
Make sure to check out Speaker Benefits and CFP Principles.
See you at OFFZONE 2020!