How to use Ghidra to Reverse Engineer Mobile Application https://medium.com/bugbountywriteup/how-to-use-ghidra-to-reverse-engineer-mobile-application-c2c89dc5b9aa #reverse #android #ghidra #newbie #dukeBarman
Medium
How to use Ghidra to Reverse Engineer Mobile Application
Unveil the
Hyper-V debugging for beginners. 2nd edition. https://hvinternals.blogspot.com/2021/01/hyper-v-debugging-for-beginners-2nd.html #debugger #reverse #hypervisor #dukeBarman
Blogspot
Hyper-V debugging for beginners. 2nd edition.
hyper-v internals
A tracing disassembler & IDE for Gameboy ROMs — integrated with Sameboy for emulation & debugging https://github.com/jverkoey/windfish/ #reverse #hardware #dukeBarman
GitHub
GitHub - jverkoey/windfish: A tracing disassembler & UI for Gameboy ROMs — integrated with Sameboy for emulation & debugging.
A tracing disassembler & UI for Gameboy ROMs — integrated with Sameboy for emulation & debugging. - jverkoey/windfish
Analyzing Keyboard Firmware Part 1 https://mrexodia.github.io/reversing/2019/09/28/Analyzing-keyboard-firmware-part-1
Analyzing Keyboard Firmware Part 2 https://mrexodia.github.io/reversing/2019/10/13/Analyzing-keyboard-firmware-part-2
Not Analyzing Keyboard Firmware Part 3 https://mrexodia.github.io/reversing/2019/11/25/Not-analyzing-keyboard-firmware-part-3
#reverse #hardware #dukeBarman
Analyzing Keyboard Firmware Part 2 https://mrexodia.github.io/reversing/2019/10/13/Analyzing-keyboard-firmware-part-2
Not Analyzing Keyboard Firmware Part 3 https://mrexodia.github.io/reversing/2019/11/25/Not-analyzing-keyboard-firmware-part-3
#reverse #hardware #dukeBarman
mrexodia.github.io
Analyzing Keyboard Firmware Part 1 - mrexodia's blog
Blog dedicated to (x64dbg) programming, reverse engineering and general hacking.
Introduction to Ghidra Scripting for Embedded ELFs and UPX https://www.archcloudlabs.com/projects/ghidra_scripting_01/ #reverse #ghidra #dukeBarman
Arch Cloud Labs
Introduction to Ghidra Scripting for Embedded ELFs and UPX
About the Project The more Cryptominer malware I look at (or anything targeting Linux), the more trends I’ve identified that are common regardless of the underlying intent. Everyone loves to use UPX.
And why wouldn’t they? It’s a free Open Source packer that…
And why wouldn’t they? It’s a free Open Source packer that…
[Reverse Engineering Tips] — Binary Diffing https://medium.com/malware-buddy/reverse-engineering-tips-binary-diffing-17760bd89f39 #reverse #dukeBarman
Medium
[Reverse Engineering Tips] — Binary Diffing
Binary diffing is a great way to visualize and spot differences in multiple samples. As a malware researcher, this is useful for…
How To Reverse Engineer RC4 Crypto For Malware Analysis https://www.youtube.com/watch?v=-EQKiIbOLEc #reverse #malware #ghidra #dukeBarman
YouTube
How To Reverse Engineer RC4 Crypto For Malware Analysis
View our malware analysis training: https://AGDCservices.com/training/
Follow me on Twitter for RE tips and resources: https://twitter.com/AGDCservices
View our malware analysis products to aid in your RE efforts (Ghidra / python scripts, tools, and individual…
Follow me on Twitter for RE tips and resources: https://twitter.com/AGDCservices
View our malware analysis products to aid in your RE efforts (Ghidra / python scripts, tools, and individual…
New campaign targeting security researchers https://blog.google/threat-analysis-group/new-campaign-targeting-security-researchers
Google
New campaign targeting security researchers
Details on an ongoing campaign, which we attribute to a government-backed entity based in North Korea, targeting security researchers working on vulnerability research and development.
Reverse Engineering iMessage: Leveraging the Hardware to Protect the Software https://www.nowsecure.com/blog/2021/01/27/reverse-engineering-imessage-leveraging-the-hardware-to-protect-the-software/ #reverse #mobile #ios #dukeBarman
Nowsecure
Reverse Engineering iMessage to Help Improve Security | NowSecure
Our researcher reverse engineered Apple iMessage to explore extending it the secure messaging app to other systems. See how he fared.
Open Source Security Foundation (OpenSSF): Reflection and Future https://www.linuxfoundation.org/en/blog/openssf-reflection-and-future/ #security #linux #dukeBarman
Now you can give to a hacky debugger Voltron another chance. New maintainer zcutlip promises updates and ask to feedback in issues and PR https://github.com/snare/voltron #reverse #debugger #gdb #lldb #dukeBarman
GitHub
GitHub - snare/voltron: A hacky debugger UI for hackers
A hacky debugger UI for hackers. Contribute to snare/voltron development by creating an account on GitHub.
Write Windows Shellcode in Rust https://github.com/b1tg/rust-windows-shellcode #reverse #exploitation #dukeBarman
GitHub
GitHub - b1tg/rust-windows-shellcode: Windows shellcode development in Rust
Windows shellcode development in Rust. Contribute to b1tg/rust-windows-shellcode development by creating an account on GitHub.
In-depth dive into the security features of the Intel/Windows platform secure boot process
https://igor-blue.github.io/2021/02/04/secure-boot.html
#uefi #hardware #jeisonwi
https://igor-blue.github.io/2021/02/04/secure-boot.html
#uefi #hardware #jeisonwi
Igor's Blog
In-depth dive into the security features of the Intel/Windows platform secure boot process
Introduction and System Architecture Buses More Components The Flash Chip Overview Early power on Bring-Up (BUP) CPU initialization UEFI initialization Loading the boot loader Windows Boot …
Unnamed Reverse Engineering Podcast 045 - Rizin and Cutter https://unnamedre.com/episode/45 #reverse #rizin #podcasts #dukeBarman
Unnamedre
045 - Rizin and Cutter
An Interview with Itay Cohen and Florian Märkl
Multi-disassemblers collaboration framework for reverse engineering https://github.com/Martyx00/CollaRE #reverse #ghidra #rizin #ida #binaryninja #dukeBarman
GitHub
GitHub - Martyx00/CollaRE: Multi-tool reverse engineering collaboration solution.
Multi-tool reverse engineering collaboration solution. - Martyx00/CollaRE
Black Hat USA 2020 materials https://www.youtube.com/watch?v=kyqeBGNSEIc&list=PLH15HpR5qRsXE_4kOSy_SXwFkFQre4AV_ #video #conference #blackhat #dukeBarman
YouTube
Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant
Google Cloud's security model in many ways is quite different from AWS. Spark jobs, Cloud Functions, Jupyter Notebooks, and more default to having administrative capabilities over cloud API's. Instead of defaulting to no capabilities, permissions are granted…
👍1
📢 ZN 2021: new time and place
Nothing can compare to the energy of live conversation. ZN 2021 will take place at Sevkabel Port, St Petersburg on June, 30.
Early registration is available. Use promocode EARLYBIRD to get 20% off till the end of March
https://zeronights.ru
#ZN #ZeroNights #conference
Nothing can compare to the energy of live conversation. ZN 2021 will take place at Sevkabel Port, St Petersburg on June, 30.
Early registration is available. Use promocode EARLYBIRD to get 20% off till the end of March
https://zeronights.ru
#ZN #ZeroNights #conference
Wubes is like Qubes but for Windows. The idea is to leverage the Windows Sandbox technology to spawn applications in isolation. https://github.com/nccgroup/Wubes #windows #security #dukeBarman
GitHub
GitHub - nccgroup/Wubes: Qubes containerization on Windows
Qubes containerization on Windows . Contribute to nccgroup/Wubes development by creating an account on GitHub.
KOPYCAT - Linux Kernel module-less implant (backdoor) https://github.com/milabs/kopycat #linux #exploitation
GitHub
GitHub - milabs/kopycat: Linux Kernel module-less implant (backdoor)
Linux Kernel module-less implant (backdoor). Contribute to milabs/kopycat development by creating an account on GitHub.