Hacking Reolink cameras for fun and profit https://www.thirtythreeforty.net/posts/2020/05/hacking-reolink-cameras-for-fun-and-profit/ #reverse #hardware #ghidra #dukeBarman
www.thirtythreeforty.net
Hacking Reolink cameras for fun and profit
Dragging Reolink, kicking and screaming, into the light of the open-standards day
GhostDNS Source Code Leaked - analyse from Avast Team https://decoded.avast.io/simonamusilova/ghostdns-source-code-leaked/ #reverse #malware #dukeBarman
Documentation and notes on using the Hiew editor https://github.com/taviso/hiewdocs/ #reverse #dukeBarman
GitHub
GitHub - taviso/hiewdocs: Documentation and notes on using the Hiew editor.
Documentation and notes on using the Hiew editor. Contribute to taviso/hiewdocs development by creating an account on GitHub.
Reinventing Vulnerability Disclosure using Zero-knowledge Proofs https://blog.trailofbits.com/2020/05/21/reinventing-vulnerability-disclosure-using-zero-knowledge-proofs/ #exploitation #dukeBarman
The Trail of Bits Blog
Reinventing Vulnerability Disclosure using Zero-knowledge Proofs
We, along with our partner Matthew Green at Johns Hopkins University, are using zero-knowledge (ZK) proofs to establish a trusted landscape in which tech companies and vulnerability researchers can communicate reasonably with one another without fear of being…
MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers" https://github.com/puppet-meteor/MOpt-AFL #fuzzing #dukeBarman
GitHub
GitHub - puppet-meteor/MOpt-AFL: MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers"
MOpt-AFL provided by the paper "MOPT: Optimized Mutation Scheduling for Fuzzers" - puppet-meteor/MOpt-AFL
Safe-Linking – Eliminating a 20 year-old malloc() exploit primitive https://research.checkpoint.com/2020/safe-linking-eliminating-a-20-year-old-malloc-exploit-primitive/ #exploitation #dukeBarman
Check Point Research
Safe-Linking - Eliminating a 20 year-old malloc() exploit primitive - Check Point Research
Research by: Eyal Itkin Overview One of our goals for every research project we work on in Check Point Research is to get an intimate understanding of how software work: What components do they contain? Are they vulnerable? How can attackers exploit these…
idados debugger plugin (DOSBOX+IDA) https://github.com/lab313ru/idados_dosbox #reverse #ida #debugger #dukeBarman
GitHub
GitHub - lab313ru/idados_dosbox: idados debugger plugin (DOSBOX+IDA)
idados debugger plugin (DOSBOX+IDA). Contribute to lab313ru/idados_dosbox development by creating an account on GitHub.
Magic [probably] behind Hex-Rays https://engineering.avast.io/magic-probably-behind-hex-rays/ #reverse #ida #dukeBarman
Basics of hardware hacking - this course shows the basics of hardware hacking using password auhenticaton code as an example https://maldroid.github.io/hardware-hacking/ #reverse #hardware #dukeBarman
Basics of hardware hacking
Welcome!
This course shows the basics of hardware hacking using password auhenticaton code as an example.Created by @maldr0id
Batch Binary Analysis with IDA Pro 7.4 Automation http://irq5.io/2020/05/25/batch-binary-analysis-with-ida-pro-7-4-automation/ #reverse #ida #dukeBarman
irq5.io
Batch Binary Analysis with IDA Pro 7.4 Automation
It is easy to script analysis steps with IDAPython, but now we want to automate this analysis over, let’s say, 10,000 files. I did a quick Google and I couldn’t find a guide on how to p…
One ring (zero) to rule them all (EDR reverse engineering) https://medium.com/@b1tst0rm/one-ring-zero-to-rule-them-all-9ec99d914c68 #reverse #windows #dukeBarman
Medium
One ring (zero) to rule them all.
Part 1
A LoRaWAN Securiy Evaluation Framework https://github.com/seemoo-lab/chirpotle #exploitation #dukeBarman
GitHub
GitHub - seemoo-lab/chirpotle: A LoRaWAN Security Evaluation Framework
A LoRaWAN Security Evaluation Framework. Contribute to seemoo-lab/chirpotle development by creating an account on GitHub.
RuhrSec 2020 #StayAtHome Edition: Code emulation ... radare2's ESIL by Arnau Gàmez i Montolio https://www.youtube.com/watch?v=4ATseh8aRTE #reverse #radare2 #conference #dukeBarman
YouTube
RuhrSec 2020 #StayAtHome Edition: Code emulation ... radare2's ESIL, Arnau Gàmez i Montolio
RuhrSec is the annual English speaking non-profit IT security conference with cutting-edge security talks by renowned experts. RuhrSec is organized by Hackmanit.
🔽 More information ...
Due to the coronavirus, we decided to cancel RuhrSec 2020. Thanks to…
🔽 More information ...
Due to the coronavirus, we decided to cancel RuhrSec 2020. Thanks to…
Kopycat 0.3.20 has just been released!
It is a multi-architecture hardware emulation solution which supports the following architectures:
MIPS, ARM, MSP430, v850ES, x86
https://github.com/inforion/kopycat/releases/tag/v0.3.20
#re #hardware #emulation #mips #arm #darw1n
It is a multi-architecture hardware emulation solution which supports the following architectures:
MIPS, ARM, MSP430, v850ES, x86
https://github.com/inforion/kopycat/releases/tag/v0.3.20
#re #hardware #emulation #mips #arm #darw1n
GitHub
Release Release of version 0.3.20 · inforion/kopycat
Kopycat now is a fully open-source project. In this release we have tried to do our best to run different widespread systems on the emulator. Previous release could run STM32F0xx with FreeRTOS oper...
A code-searching/completion tool, for IDA APIs https://github.com/0xKira/api_palette #reverse #ida #dukeBarman
GitHub
GitHub - 0xKira/api_palette: A code-searching/completion tool, for IDA APIs
A code-searching/completion tool, for IDA APIs. Contribute to 0xKira/api_palette development by creating an account on GitHub.
The Basics of Exploit Development 1: Win32 Buffer Overflows https://www.coalfire.com/The-Coalfire-Blog/January-2020/The-Basics-of-Exploit-Development-1 #exploitation #windows #dukeBarman
Coalfire
Coalfire Blog
Resource covering the most important issues in IT security and compliance as well as insights on IT GRC issues that impact the industries that we serve.
PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware https://github.com/D4stiny/PeaceMaker #malware #dukeBarman
GitHub
GitHub - D4stiny/PeaceMaker: PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques…
PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware. - D4stiny/PeaceMaker
CVE-2020-12138 Exploit Proof-of-Concept, Privilege Escalation in ATI Technologies Inc. Driver atillk64.sys https://h0mbre.github.io/atillk64_exploit/ #exploitation #exploit #dukeBarman
The Human Machine Interface
CVE-2020-12138 Exploit Proof-of-Concept, Privilege Escalation in ATI Technologies Inc. Driver atillk64.sys
Background
Windows System Call Tables (NT/2000/XP/2003/Vista/2008/7/2012/8/10) https://github.com/j00ru/windows-syscalls #reverse #windows #dukeBarman
GitHub
GitHub - j00ru/windows-syscalls: Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11)
Windows System Call Tables (NT/2000/XP/2003/Vista/7/8/10/11) - j00ru/windows-syscalls
BaseSAFE: Baseband SAnitized Fuzzing through Emulation Article: https://arxiv.org/pdf/2005.07797.pdf Source: https://github.com/fgsect/BaseSAFE #fuzzing #dukeBarman