Analyzing a New macOS DNS Hijacker: OSX/MaMi https://objective-see.com/blog/blog_0x26.html #malware #re #osx #dukeBarman
objective-see.org
Ay MaMi
Analyzing a New macOS DNS Hijacker: OSX/MaMi
HIEW hexadecimal editor and disassembler tutorial series HD https://www.youtube.com/playlist?list=PLNOfNDUC-diyGmGkln8mAEQ7-awbDBIVM #re #hiew #dukeBarman
YouTube
HIEW hexadecimal editor and disassembler tutorial series HD
Share your videos with friends, family, and the world
Debugger Data Model, Javascript & X64 Exception Handling http://doar-e.github.io/blog/2017/12/01/debugger-data-model/ #debugger #windbg #dukeBarman
Vulners Tools: применяем базу данных уязвимостей на практике https://habrahabr.ru/post/346740/ #vulners #exploit
https://ntopcode.wordpress.com/2018/01/16/anatomy-of-the-thread-suspension-mechanism-in-windows-windows-internals/ #internals #darw1n
Opcode
Anatomy of the thread suspension mechanism in Windows (Windows Internals)
Introduction Process suspension is a technique which is quite well-known, and it is used for a variety of reasons (even by malicious software sometimes). The term “suspension” means “stoppin…
The technical details of a working remote exploit chain for pixel (CVE-2017-5116, CVE-2017-14904) https://security.googleblog.com/2018/01/android-security-ecosystem-investments.html #darw1n
Google Online Security Blog
Android Security Ecosystem Investments Pay Dividends for Pixel
Posted by Mayank Jain and Scott Roberts, Android security team [Cross-posted from the Android Developers Blog ] In June 2017, the Androi...
Good reading about Reverse Engineering https://twitter.com/comex/status/954129329499156480 #re #decompiler
Twitter
comex
This is something I’ve wanted for a long time. But maybe it’s too late… even if I never do get around to writing my own decompiler, RetDec is open source and looks really nice. https://t.co/UBPXRNvtBl
Enabling debug-uarts on DFU-like iBoot https://nyansatan.github.io/dfu-uart/ #uart #debugger #iboot #dukeBarman
Videos from ZN 2017: https://www.youtube.com/channel/UCtQ0fPmP4fCGBkYWMxnjh6A #darw1n
YouTube
ZeroNights
ZeroNights is the quintessence of what the cybersecurity community experienced during the year.
Pentesters, reverse-engineers, analysts gather at one place to discuss and learn about new threats, attacks, and protection measures.
ZeroNights conference website:…
Pentesters, reverse-engineers, analysts gather at one place to discuss and learn about new threats, attacks, and protection measures.
ZeroNights conference website:…
Posts series about using Radare2 - Radare2’s Visual Mode : https://moveax.me/radare2-visual-mode/ , Crackme0x03 Dissected with Radare2 : https://moveax.me/crackme0x03/ , Crackme0x02 Dissected with Radare2 : https://moveax.me/crackme0x02/ , Crackme0x01 Dissected with Radare2 : https://moveax.me/crackme0x01/ #radare2 #re #dukeBarman
https://www.reddit.com/r/SwitchHacks/comments/7rq0cu/jamais_vu_a_100_trustzone_code_execution_exploit/ #re #exploit #dukeBarman
Reddit
From the SwitchHacks community on Reddit: jamais vu - a 1.0.0 TrustZone code execution exploit on the Nintendo Switch
Explore this post and more from the SwitchHacks community