Analysing "Trigger-based" Malware with S2E https://adrianherrera.github.io/post/malware-s2e/ #malware #s2e #dukeBarman
adrianherrera.github.io
Analysing "Trigger-based" Malware with S2E
Introduction This blog post is a quick brain-dump of the work that I was doing during my last month in the Dependable Systems Lab at EPFL. At the time I was working on malware analysis with S2E. While not anything earth-shatteringly novel, I’m hopeful that…
Insecure Firmware Updates in Server Management Systems https://blog.eclypsium.com/2018/09/06/insecure-firmware-updates-in-server-management-systems/ #hardware #dukeBarman
Firmware is the new Software https://www.platformsecuritysummit.com/2018/speaker/hudson/ #hardware #dukeBarman
Platformsecuritysummit
Firmware is the new Software - Trammell Hudson, Two Sigma - Platform Security Summit 2018
Conference on composable software supply chain integrity and hardware-assisted platform security, with OpenEmbedded, OpenXT and other ecosystems
r2dec Version 1.0 has been released in the master. update your version via r2pm install r2dec (it will do a git pull) https://github.com/wargio/r2dec-js #reverse #radare2 #dukeBarman
GitHub
GitHub - wargio/r2dec-js: r2dec-js is a JavaScript-based decompiler that converts assembly code into pseudo-C. It aids users in…
r2dec-js is a JavaScript-based decompiler that converts assembly code into pseudo-C. It aids users in understanding assembly by providing readable high-level explanations, making low-level programm...
R2con talks slides https://github.com/radareorg/r2con/tree/master/2018/talks #radare2 #r2con #jeisonwi
beebug - A tool for checking exploitability https://github.com/invictus1306/beebug #radare2 #reverse #dukeBarman #r2con
GitHub
GitHub - invictus1306/beebug: A tool for checking exploitability
A tool for checking exploitability. Contribute to invictus1306/beebug development by creating an account on GitHub.
Recognition Techniques for Renaming Functions in Windows Malware https://drive.google.com/file/d/1Iipl75M1WaaETwjVE7S5nvi2P_Za1ZFX/view #r2con #radare2 #dukeBarman
Falkervisor (grilled_cheese) - hypervisor written in C https://github.com/gamozolabs/falkervisor_grilled_cheese Using (for fuzzing r2): https://www.youtube.com/watch?v=AqFMSI8e9Qo #radare2 #fuzzing #dukeBarman
GitHub
GitHub - gamozolabs/falkervisor_grilled_cheese
Contribute to gamozolabs/falkervisor_grilled_cheese development by creating an account on GitHub.
Scaling up Binary Exploitation Education https://blog.ret2.io/2018/09/11/scalable-security-education/ #reverse #dukeBarman
RET2 Systems Blog
Scaling up Binary Exploitation Education
The shortage of proficient cyber operators in a world now dependent on connectivity and information has left nations scrambling to build capabilities in a vo...
Modern Jailbreaks' Post-Exploitation https://blog.quarkslab.com/modern-jailbreaks-post-exploitation.html #ios #jailbreak #dukeBarman
Ежели кто хочет помочь радару и не только, но знает только питон - есть хорошая возможность поработать над этими двумя проектами https://github.com/radare/radare2ida/issues и https://github.com/williballenthin/python-idb/issues #radare2 #jeisonwi
GitHub
Issues · radare/radare2ida
Tools, documentation and scripts to move projects from IDA to R2 and viceversa - Issues · radare/radare2ida
Decrypting Mirai Configuration With Radare2 (Part 2) http://www.mien.in/2018/09/15/decrypting-mirai-configuration-with-radare2-part-2/ #radare2 #malware #dukeBarman