Relyze Desktop v3 (includes our x86, x64, arm and arm64 decompiler) was released. Free for non commercial usage https://blog.relyze.com/2020/04/introducing-relyze-desktop-3.html #reverse #dukeBarman
BasicFUN Series Part 4: I2C Sniffing, EEPROM Extraction and Parallel Flash Extraction https://wrongbaud.github.io/Holiday-Teardown/ #reverse #hardware #dukeBarman
JEB 3.17.1 Anti-Covid19 Edition by DS
https://forum.reverse4you.org/t/jeb-3-17-1-anti-covid19-edition-by-ds/11035
#re #tools #jeb #darw1n
https://forum.reverse4you.org/t/jeb-3-17-1-anti-covid19-edition-by-ds/11035
#re #tools #jeb #darw1n
BinRec: Dynamic Binary Lifting and Recompilation https://download.vusec.net/papers/binrec_eurosys20.pdf #reverse #dukeBarman
hardwear.io 2020 will be online too! Virtual Con: Hacking, Community, and Hope https://hardwear.io/virtual-con-2020/ #reverse #hardware #conference #dukeBarman
hardwear.io
Hardwear.io Virtual Conference 2020 | Hacking, Community and Hope
30th April and 1st May 2020 | 10:00 am to 1:00 pm PDT (GMT-7) | Let's talk Hardware Security
How a one line change in the Windows kernel broke the Windows Chromium sandbox (and thus Edge and Firefox at the same time) https://googleprojectzero.blogspot.com/2020/04/you-wont-believe-what-this-one-line.html #exploitation #dukeBarman
Blogspot
You Won't Believe what this One Line Change Did to the Chrome Sandbox
Posted by James Forshaw, Project Zero The Chromium sandbox on Windows has stood the test of time. Itβs considered one of the better sand...
The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs https://www.usenix.org/system/files/sec20fall_ender_prepub.pdf #exploitation #hardware #Startbleed #dukeBarman
Fuzzing sockets, part 1: FTP servers (afl++) https://securitylab.github.com/research/fuzzing-sockets-FTP #fuzzing #dukeBarman
GitHub Security Lab
Fuzzing sockets, part 1: FTP servers
Antonio shares findings and tips from his research on socket-based fuzzing. Letβs start with the audit of three widely-used FTP servers, with details on interesting CVEs found along the way.
MindShaRE: Using lldbinit to Enhance the LLDB Debugger https://www.zerodayinitiative.com/blog/2020/4/20/mindshare-using-lldbinit-to-enhance-the-lldb-debugger #reverse #debugger #lldb #dukeBarman
Zero Day Initiative
Zero Day Initiative β MindShaRE: Using lldbinit to Enhance the LLDB Debugger
MindShaRE is our periodic look at various reverse engineering tips and tricks. The goal is to keep things small and discuss some everyday aspects of reversing. You can view previous entries in this series here .
Cleanly Escaping the Chrome Sandbox https://theori.io/research/escaping-chrome-sandbox #exploitation #dukeBarman
LibreSSL and OSS-Fuzz: The story of a fuzzing integration reward https://blog.doyensec.com//2020/04/08/libressl-fuzzer.html #fuzzing #dukeBarman
Doyensec
LibreSSL and OSS-Fuzz
In my first month at Doyensec I had the opportunity to bring together both my work and my spare time hobbies. I used the 25% research time offered by Doyensec to integrate the LibreSSL library into OSS-Fuzz. LibreSSL is an API compatible replacement for OpenSSLβ¦
Why anti-cheat software utilize kernel drivers (and a little bit about of valorant) https://secret.club/2020/04/17/kernel-anticheats.html #reverse #dukeBarman
secret club
Why anti-cheat software utilize kernel drivers
You can contact me on twitter if you have any questions
Mount & Blade: Warband, infodump https://reversing.games/jekyll/update/2020/04/23/mount-blade-warband-infodump.html #reverse #dukeBarman
HITB Lockdown Livestream in live https://www.youtube.com/watch?v=krFHJx08dMo #conference #video #dukeBarman
How Ghidra changed my life - Chris Eagle https://www.youtube.com/watch?v=KL1jE9dxas0 #video #reverse #ghidra #conference #kernelcon #dukeBarman
YouTube
k20 - How Ghidra changed my life - Chris Eagle
Anyone that knows me also knows that I'm a huge IDA Pro fanboy. Ghidra, the NSA's answer to IDA, has been in the public's hands for about a year now, so where does that leave me? Still solidly in the IDA camp, but that doesn't mean that Ghidra hasn't hadβ¦
Polypyus - Firmware Historian. Based on capstone, pyelftools. It learns to locate functions in raw binaries by extracting known functions from similar binaries https://github.com/seemoo-lab/polypyus #reverse #dukeBarman
GitHub
GitHub - seemoo-lab/polypyus
Contribute to seemoo-lab/polypyus development by creating an account on GitHub.
Dobby a lightweight, multi-platform, multi-architecture hook framework. https://github.com/jmpews/Dobby #reverse #dukeBarman
GitHub
GitHub - jmpews/Dobby: a lightweight, multi-platform, multi-architecture hook framework.
a lightweight, multi-platform, multi-architecture hook framework. - jmpews/Dobby
Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications. https://github.com/NorthwaveNL/fridax #frida #android #ios #dukeBarman
GitHub
GitHub - NorthwaveSecurity/fridax: Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOTβ¦
Fridax enables you to read variables and intercept/hook functions in Xamarin/Mono JIT and AOT compiled iOS/Android applications. - NorthwaveSecurity/fridax