Binary Ninja developers open sourced two of their core architectures: armv7 and aarch64
Code: https://github.com/Vector35/arch-armv7 and https://github.com/Vector35/arch-arm64
Article: https://binary.ninja/2020/10/07/open-source-architectures.html
#reverse #arm #binaryninja #dukeBarman
Code: https://github.com/Vector35/arch-armv7 and https://github.com/Vector35/arch-arm64
Article: https://binary.ninja/2020/10/07/open-source-architectures.html
#reverse #arm #binaryninja #dukeBarman
GitHub
GitHub - Vector35/arch-armv7: ARMv7 architecture plugin
ARMv7 architecture plugin. Contribute to Vector35/arch-armv7 development by creating an account on GitHub.
Python-idb now 0.7.1 now supports IDA Pro 5.x-7.5 databases versions and has better API support, no IDA Pro itself required https://pypi.org/project/python-idb/
#reverse #ida #jeisonwi
#reverse #ida #jeisonwi
KaitaiStruct, a cross-language binary format parser API generator, released a new major version 0.9! C++11 support, data validations, little-endian integers, 3 new targets, ... http://kaitai.io/news/2020/10/16/kaitai-struct-v0.9-released.html #reverse #dukeBarman
kaitai.io
Kaitai Struct: declarative binary format parsing language
Kaitai Struct is a formal language for binary format specification that can be compiled into parser code
ESILSolve - A python symbolic execution framework using r2 and ESIL https://github.com/aemmitt-ns/esilsolve (now support symbolically execution PCODE) #reverse #radare2 #ghidra #dukeBarman
GitHub
GitHub - radareorg/esilsolve: A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)
A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language) - radareorg/esilsolve
Introducing MIDNIGHTTRAIN - A Covert Stage-3 Persistence Framework weaponizing UEFI variables https://slaeryan.github.io/posts/midnighttrain.html #reverse #uefi #dukeBarman
Resurrected IDA plugin for UEFI RE - ida-efitools "v2.0" is now LIVE https://github.com/p-state/ida-efitools2 #reverse #uefi #ida #dukeBarman
GitHub
GitHub - p-state/ida-efitools2: IDA plugin for extending UEFI reverse engineering capabilities
IDA plugin for extending UEFI reverse engineering capabilities - p-state/ida-efitools2
Binary Ninja loader for 64 bits SEPROMs https://github.com/matteyeux/seprom-loader #reverse #ios #binaryninja #dukeBarman
GitHub
GitHub - matteyeux/seprom-loader: Binary Ninja loader for 64 bits Apple SEPROMs
Binary Ninja loader for 64 bits Apple SEPROMs. Contribute to matteyeux/seprom-loader development by creating an account on GitHub.
Letβs build a high-performance fuzzer with GPUs! https://blog.trailofbits.com/2020/10/22/lets-build-a-high-performance-fuzzer-with-gpus/ #fuzzing #dukeBarman
The Trail of Bits Blog
Letβs build a high-performance fuzzer with GPUs!
TL;DR: Can we use GPUs to get 10x performance/dollar when fuzzing embedded software in the cloud? Based on our preliminary work, we think the answer is yes! Fuzzing is a software testing technique that supplies programs with many randomized inputs in an attemptβ¦
A curated list of Android Security materials and resources For Pentesters and Bug Hunters
https://github.com/saeidshirazi/awesome-android-security
#reverse #pentest #mobile #Und3rCover
https://github.com/saeidshirazi/awesome-android-security
#reverse #pentest #mobile #Und3rCover
GitHub
GitHub - saeidshirazi/awesome-android-security: A curated list of Android Security materials and resources For Pentesters and Bugβ¦
A curated list of Android Security materials and resources For Pentesters and Bug Hunters - saeidshirazi/awesome-android-security
Don't Ruck Us Again - The Exploit Returns
https://alephsecurity.com/2020/10/14/ruckus-wireless-2/
#exploitation #hardware #jeisonwi
https://alephsecurity.com/2020/10/14/ruckus-wireless-2/
#exploitation #hardware #jeisonwi
Alephsecurity
Don't Ruck Us Again - The Exploit Returns
gdb v10.1 was released!
Details: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=blob_plain;f=gdb/NEWS;hb=gdb-10.1-release
Download: ftp://ftp.gnu.org/gnu/gdb
#reverse #debugger #dukeBarman
Details: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;a=blob_plain;f=gdb/NEWS;hb=gdb-10.1-release
Download: ftp://ftp.gnu.org/gnu/gdb
#reverse #debugger #dukeBarman
IDA Pro 7.5 SP3 released https://www.hex-rays.com/products/ida/news/7_5sp3/ #reverse #ida #dukeBarman
CHIPSEC 1.5.6 has been released! https://github.com/chipsec/chipsec/releases/tag/1.5.6 #reverse #uefi #dukeBarman
GitHub
Release Chipsec v1.5.6 Β· chipsec/chipsec
New or Updated Modules/UtilCmds:
common.secureboot.variables - Changed verbiage around "Blacklist" and "Whitelist" to use neutral terms
tools.smm.smm_ptr - Fixed python3 str/by...
common.secureboot.variables - Changed verbiage around "Blacklist" and "Whitelist" to use neutral terms
tools.smm.smm_ptr - Fixed python3 str/by...
Easily examine and understand any Windows system's hardware and software capability to prevent Meltdown and Spectre attacks.
https://www.grc.com/inspectre.htm
#tools #darw1n
https://www.grc.com/inspectre.htm
#tools #darw1n
Grc
GRC | InSpectre
InSpectre - Inspect Windows Meltdown and Spectre Vulnerability
Updates to XNU debugging tutorial https://www.hex-rays.com/blog/updates-to-xnu-debugging-tutorial/ #debugger #ida #ios #macos #dukeBarman
Patch Diffing a Cisco RV110W Firmware Update (Part II) https://quentinkaiser.be/exploitdev/2020/10/01/patch-diffing-cisco-rv110/ #reverse #ghidra #hardware #dukeBarman
QTNKSR
Patch Diffing a Cisco RV110W Firmware Update (Part II)
This is the second part of a two part blog series on patch diffing Cisco RV firmware where I try to identify fixed flaws (namely CVE-2020-3323, CVE-2020-3330, and CVE-2020-3332). In the first part we identified the static credentials present in Cisco RV110β¦
IDA Home Cloud-based Decompilers Beta Testing
https://www.hex-rays.com/products/idahome/ida-home-cloud-based-decompilers-beta-testing/
#reverse #ida #KosBeg
https://www.hex-rays.com/products/idahome/ida-home-cloud-based-decompilers-beta-testing/
#reverse #ida #KosBeg
Reversing C++ Without Getting a Heart Attack β DEvirtualize VIrtual Calls With Devi https://insinuator.net/2020/11/reversing-c-without-getting-a-heart-attack-devirtualize-virtual-calls-with-devi/ #reverse #ghidra #dukeBarman