Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.1 https://0x00sec.org/t/breaking-the-d-link-dir3060-firmware-encryption-static-analysis-of-the-decryption-routine-part-2-1 #reverse #ida #hardware #dukeBarman
FuZZan: Efficient Sanitizer Metadata Design for Fuzzing
Source: https://github.com/HexHive/FuZZan
Article: http://hexhive.epfl.ch/publications/files/20ATC.pdf
#fuzzing #dukeBarman
Source: https://github.com/HexHive/FuZZan
Article: http://hexhive.epfl.ch/publications/files/20ATC.pdf
#fuzzing #dukeBarman
GitHub
GitHub - HexHive/FuZZan: FuZZan: Efficient Sanitizer Metadata Design for Fuzzing
FuZZan: Efficient Sanitizer Metadata Design for Fuzzing - HexHive/FuZZan
WinDbg Basics for Malware Analysis https://www.youtube.com/watch?v=QuFJpH3My7A #reverse #malware #windbg #debugger #dukeBarman
YouTube
WinDbg Basics for Malware Analysis
In this tutorial we cover the basics of debugging malware with WinDbg. Expand for more...
-----
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
OALABS PATREON
https://www.patreon.com/oalabs
OALABS TIP JAR
https://ko-fi.com/oalabs
OALABS GITHUB
https://gโฆ
-----
OALABS DISCORD
https://discord.gg/6h5Bh5AMDU
OALABS PATREON
https://www.patreon.com/oalabs
OALABS TIP JAR
https://ko-fi.com/oalabs
OALABS GITHUB
https://gโฆ
Procmon is a Linux reimagining of the classic Procmon tool from the Sysinternals suite of tools for Windows https://github.com/microsoft/ProcMon-for-Linux #linux #dukeBarman
GitHub
GitHub - microsoft/ProcMon-for-Linux: A Linux version of the Procmon Sysinternals tool
A Linux version of the Procmon Sysinternals tool. Contribute to microsoft/ProcMon-for-Linux development by creating an account on GitHub.
MMS Exploit Part 1: Introduction to the Samsung Qmage Codec and Remote Attack Surface https://googleprojectzero.blogspot.com/2020/07/mms-exploit-part-1-introduction-to-qmage.html #fuzzing #exploitation #android #dukeBarman
Blogspot
MMS Exploit Part 1: Introduction to the Samsung Qmage Codec and Remote Attack Surface
Posted by Mateusz Jurczyk, Project Zero This post is the first of a multi-part series capturing my journey from discovering a vulnerable...
r2syntia (alpha stage), an integration of the program synthesis tool Syntia into #radare2, allowing to synthesize the semantics of obfuscated code https://github.com/arnaugamez/r2syntia #reverse #dukeBarman
GitHub
GitHub - arnaugamez/r2syntia: Integration of Syntia program synthesis tool into the radare2 reverse engineering framework.
Integration of Syntia program synthesis tool into the radare2 reverse engineering framework. - arnaugamez/r2syntia
Tools to process ARM's Machine Readable Architecture Specification https://github.com/alastairreid/mra_tools #reverse #dukeBarman
GitHub
GitHub - alastairreid/mra_tools: Tools to process ARM's Machine Readable Architecture Specification
Tools to process ARM's Machine Readable Architecture Specification - alastairreid/mra_tools
The FLARE team's open-source tool to identify capabilities in executable files https://github.com/fireeye/capa #reverse #dukeBarman
GitHub
GitHub - mandiant/capa: The FLARE team's open-source tool to identify capabilities in executable files.
The FLARE team's open-source tool to identify capabilities in executable files. - mandiant/capa
Radare2 4.5.0 Codename: "Organized Chaos" released https://github.com/radareorg/radare2/releases/tag/4.5.0 Enjoy! #reverse #radare2 #dukeBarman
GitHub
Release 4.5.0 Codename: Organized Chaos ยท radareorg/radare2
Release Notes
Version: 4.5.0
Previous: 4.4.0
Commits: 426
Contributors: 58
Highlights
Analysis
Initial API for base type kinds (enum, struct, union)
Rename PowerPC to PPC
Improve RISC-V analysis f...
Version: 4.5.0
Previous: 4.4.0
Commits: 426
Contributors: 58
Highlights
Analysis
Initial API for base type kinds (enum, struct, union)
Rename PowerPC to PPC
Improve RISC-V analysis f...
Rust reversing helper script https://github.com/cha5126568/rust-reversing-helper #reverse #ida #dukeBarman
GitHub
GitHub - cha512/rust-reversing-helper: Rust reversing helper script
Rust reversing helper script. Contribute to cha512/rust-reversing-helper development by creating an account on GitHub.
Accelerating iOS on QEMU with hardware virtualization (KVM)
https://alephsecurity.com/2020/07/19/xnu-qemu-kvm/
#ios #jeisonwi
https://alephsecurity.com/2020/07/19/xnu-qemu-kvm/
#ios #jeisonwi
Alephsecurity
Accelerating iOS on QEMU with hardware virtualization (KVM)
Writing an iOS Kernel Exploit from Scratch https://secfault-security.com/blog/chain3.html #ios #exploitation #ghidra #exploit #dukeBarman
Similar implementation of .gdbinit from fG! for lldb in python https://github.com/deroko/lldbinit #reverse #debugger #macos #ios #dukeBarman
GitHub
GitHub - deroko/lldbinit
Contribute to deroko/lldbinit development by creating an account on GitHub.
โค1
Exploiting an Envoy heap vulnerability https://blog.envoyproxy.io/exploiting-an-envoy-heap-vulnerability-96173d41792 #exploit #dukeBarman
Medium
Exploiting an Envoy heap vulnerability
Overview
WEIZZ: Automatic Grey-Box Fuzzing for Structured Binary Formats
Slides: https://andreafioraldi.github.io/assets/weizz-issta2020-slides.pdf
Video: https://www.youtube.com/watch?v=MOeUqlFtgwE
Article: https://andreafioraldi.github.io/assets/weizz-issta2020.pdf
Code: https://github.com/andreafioraldi/weizz-fuzzer
#fuzzing #dukeBarman
Slides: https://andreafioraldi.github.io/assets/weizz-issta2020-slides.pdf
Video: https://www.youtube.com/watch?v=MOeUqlFtgwE
Article: https://andreafioraldi.github.io/assets/weizz-issta2020.pdf
Code: https://github.com/andreafioraldi/weizz-fuzzer
#fuzzing #dukeBarman
script will annotate and bookmark the code with tags produced by tool Tiny Tracer https://github.com/Dump-GUY/ghidra_scripts #reverse #ghidra #dukeBarman
GitHub
GitHub - Dump-GUY/ghidra_scripts
Contribute to Dump-GUY/ghidra_scripts development by creating an account on GitHub.
Process Injection using DInvoke https://rastamouse.me/blog/process-injection-dinvoke/ #windows #exploitation #dukeBarman
PE Emulation With Code Coverage Using Qiling and Dragon Dance https://pwnage.io/pe-code-coverage-emulation-qiling/ #reverse #ghidra #dukeBarman
pwnage.io
PE Emulation With Code Coverage Using Qiling and Dragon Dance | infosec4breakfast
Qiling Emulation The Qiling emulation framework was built with the goal of emulating shellcode from various operating systems due to the ever-increasing amou...