r0 Crew (Channel)
8.81K subscribers
35 photos
1 video
9 files
1.98K links
Security Related Links:
- Reverse Engineering;
- Malware Research;
- Exploit Development;
- Pentest;
- etc;

Join to chat: @r0crew_bot 👈

Forum: https://forum.reverse4you.org
Twitter: https://twitter.com/R0_Crew
Download Telegram
Call for papers for 4th yearly conference of DC7831 in Nizhniy Novgorod

On February 15-16, 2020 our local DEF CON community is going to host our 4th yearly meetup (number 0x0C) as a full-scale 2-day conference. The event will happen in Nizhniy Novgorod, exact venue location will be announced later.

We invite speakers to make a talk or a workshop in the field of practical information security and hacking. We'd be glad to hear topics from both offensive and defensive perspectives. Examples of broad topics:

- Attacks against web services
- Vulnerabilities in networking protocols
- Vulnerabilitites in operating systems components
- Attacks against hardware
- Secure development practices
- Security audit methods

Also we'd be glad to hear about cryptography and security of cryptocurrencies, anonymous networks and other advanced and hacking topics. If you have something to talk about, don't hesitate to contact us:

telegram: @wsnark
email: wsnark 'at' tuta.io

Deadline: 1th of February, 2020

Talks can be performed in Russian or English.

We can help speakers with organizing their trip (tickets, hotel).

How it was last year: https://defcon-nn.ru/0x0A/
JEB 3.7.0 Merry Xmas Edition by DimitarSerg

1. Maximum license type (copying, scripts, etc. work now).
2. Fixed integrity check #1.
3. Fixed integrity check #2.
4. All the telemetry has been cut out.
5. Removed the update checks and other shit that tries to connect to the Internet.
6. Added/reconstructed saving/loading project function.
7. Decompilation of missing opcodes for Android has been restored.
8. Restored display of variable values when hovering over them during debugging (Android).
9. Decompiling for other platforms was fixed (tested x86/x64, webAssembly, MIPS, ARM).

Instruction:
1. Replace the original JEB.jar with fixed.
2. Register it with Keygen (run it: java Keygen)

https://forum.reverse4you.org/t/11035

#re #mobile #tools #jeb #DimitarSerg
Root cause analysis and exploit for a Windows kernel ws2ifsl.sys use-after-free vulnerability.

https://labs.bluefrostsecurity.de/blog/2020/01/07/cve-2019-1215-analysis-of-a-use-after-free-in-ws2ifsl/

#re #expdev #uaf #windows #darw1n
Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges (binaries + writeups by hacking topics) https://github.com/guyinatuxedo/nightmare #reverse #exploitation #dukeBarman
UEFI modules analysing with BinDiff IDA plugin https://yeggor.github.io/UEFI_BinDiff/ #reverse #dukeBarman