Apple bleee. Everyone knows What Happens on Your iPhone https://hexway.io/blog/apple-bleee/ #pentest #ios
JNIEnv-translate recovers the offset used to access a function in JNIEnv and translates that into the corresponding function https://github.com/maddiestone/IDAPythonEmbeddedToolkit/blob/master/Android/jni_translate.py #android #ida #dukeBarman
GitHub
IDAPythonEmbeddedToolkit/Android/jni_translate.py at master · maddiestone/IDAPythonEmbeddedToolkit
IDA Python Embedded Toolkit -- IDAPython scripts for automating analysis of firmware of embedded devices - maddiestone/IDAPythonEmbeddedToolkit
Our forum and community is 10 years old! With which we sincerely congratulate everyone from our community! Thank you for staying with us! We are very grateful to you! 🍻
Открыта регистрация и поиск докладов на 34 встречу DEFCON Russia - DCG#7812 и 4 ежегодный кораблик! Подробности: https://defcon-russia.ru/ru/2019/07/%D0%B2%D1%81%D1%82%D1%80%D0%B5%D1%87%D0%B0-4.8.2019/ #conference
defcon-russia.ru
Встреча 4.8.2019
Basic BIOS emulator for Unicorn Engine. https://github.com/macmade/unicorn-bios #hardware #dukeBarman
GitHub
GitHub - macmade/unicorn-bios: Basic BIOS emulator for Unicorn Engine.
Basic BIOS emulator for Unicorn Engine. Contribute to macmade/unicorn-bios development by creating an account on GitHub.
All videos from "Objective by the Sea, v2.0" were uploaded https://www.youtube.com/playlist?list=PLliknDIoYszvTDaWyTh6SYiTccmwOsws8 #conference #obts #dukeBarman
#ZeroNights 2019 CFP is OPEN: Offensive and defensive research (15/30/45min). Submit your talk! (link: https://01x.cfp.zeronights.ru/zn2019/) 01x.cfp.zeronights.ru/zn2019/ #conference #ZN #dukeBarman
#ZeroNights 2019 CFP is OPEN: Offensive and defensive research (15/30/45min). Submit your talk! 01x.cfp.zeronights.ru/zn2019/ #conference #ZN #dukeBarman
libdft: Practical Dynamic Data Flow Tracking https://github.com/AngoraFuzzer/libdft64 #pin #reverse #dukeBarman
GitHub
GitHub - AngoraFuzzer/libdft64: libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis)
libdft for Intel Pin 3.x and 64 bit platform. (Dynamic taint tracking, taint analysis) - AngoraFuzzer/libdft64
An Introduction To Code Analysis With Ghidra https://threatvector.cylance.com/en_us/home/an-introduction-to-code-analysis-with-ghidra.html #ghidra #reverse #newbie #dukeBarman
BlackBerry
Code Analysis With Ghidra: An Introduction
Ghidra is a free software reverse-engineering framework developed by the NSA and released as open-source software. Learn how to use Ghidra to perform malicious code analysis.
RPC_SERVER_INTERFACE parser for Ghidra https://blog.sektor7.net/#!res/2019/RPC-parser.md #ghidra #reverse #dukeBarman
blog.sektor7.net
SEKTOR7 Research Blog
malware development, malware development course, offensive code development, offensive coding, offcoding, red team operator, red teaming, blue team, blog
Update for #Ghidra building docker image: https://github.com/dukebarman/ghidra-builder Now you can build this from host's source folder. #reverse #dukeBarman
GitHub
GitHub - dukebarman/ghidra-builder: Docker image for building ghidra RE framework from source
Docker image for building ghidra RE framework from source - dukebarman/ghidra-builder
Collin Mulliner released the FwAnalyzer, a tool for automated review of firmware images, at #Blackhat 2019 https://github.com/cruise-automation/fwanalyzer #reverse #hardware #dukeBarman
GitHub
GitHub - cruise-automation/fwanalyzer: a tool to analyze filesystem images for security
a tool to analyze filesystem images for security. Contribute to cruise-automation/fwanalyzer development by creating an account on GitHub.
Arm IDA and Cross Check: Reversing the Boeing 787's Core Network https://i.blackhat.com/USA-19/Wednesday/us-19-Santamarta-Arm-IDA-And-Cross-Check-Reversing-The-787-Core-Network.pdf #reverse #hardware #blackhat #dukeBarman
Attacking iPhone XS Max https://i.blackhat.com/USA-19/Thursday/us-19-Wang-Attacking-IPhone-XS-Max.pdf #exploit #blackhat #ios #dukeBarman
Building a custom malware sandbox with PANDA - Part 1 https://adalogics.com/blog/Building-a-custom-malware-sandbox-with-PANDA-Part-1 #reverse #malware #dukeBarman
A set of tools able to transform hardware execution traces into formats more suitable for integration into other tools https://github.com/lse/wakare #reverse #radare2 #binaryninja #dukeBarman
GitHub
GitHub - lse/wakare: experimentation/code from Tanguy Dubroca (summer 2019)
experimentation/code from Tanguy Dubroca (summer 2019) - lse/wakare