Ansible Security Assessment https://blog.quarkslab.com/ansible-security-assessment.html #exploitation #dukeBarman
Quarkslab
Ansible Security Assessment - Quarkslab's blog
Ansible is an open-source software automating configuration management and software deployment. Ansible is used in Quarkslab to manage our infrastructure and in our product Irma. In order to have an idea of the security of Ansible, we conducted a securityβ¦
Advanced Windows exploit development resources https://github.com/FULLSHADE/WindowsExploitationResources #exploitation #windows #dukeBarman
GitHub
GitHub - FULLSHADE/WindowsExploitationResources: Resources for Windows exploit development
Resources for Windows exploit development. Contribute to FULLSHADE/WindowsExploitationResources development by creating an account on GitHub.
Methodology for Static Reverse Engineering of Windows Kernel Drivers https://posts.specterops.io/methodology-for-static-reverse-engineering-of-windows-kernel-drivers-3115b2efed83 #reverse #windows #dukeBarman
SpecterOps
Blog - SpecterOps
Your new best friend: Introducing BloodHound Community Edition!
FI(le) SY(stem) - full file system fuzzing framework
Source: https://github.com/0xricksanchez/fisy-fuzz
Video from HITB 2020: https://www.youtube.com/watch?v=VNzKVOsn5qQ&feature=youtu.be&t=17032
Materials: https://github.com/0xricksanchez/HITB2020_FSFUZZER
#fuzzing #dukeBarman
Source: https://github.com/0xricksanchez/fisy-fuzz
Video from HITB 2020: https://www.youtube.com/watch?v=VNzKVOsn5qQ&feature=youtu.be&t=17032
Materials: https://github.com/0xricksanchez/HITB2020_FSFUZZER
#fuzzing #dukeBarman
GitHub
GitHub - 0xricksanchez/fisy-fuzz: This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdownβ¦
This is the full file system fuzzing framework that I presented at the Hack in the Box 2020 Lockdown Edition conference in April. - 0xricksanchez/fisy-fuzz
New mac debugger tutorial for IDA: Obj-C, kernelcaches, IOS apps https://www.hex-rays.com/wp-content/uploads/2020/05/mac_debugger_primer2.pdf #reverse #ida #dukeBarman
Hardware Root of Trust β Bios and UEFI https://maxfieldchen.com/posts/2020-05-31-Hardware-Root-Of-Trust-Bios-UEFI.html #reverse #hardware #uefi #dukeBarman
RCE vulnerability in Avast Antivirus by Project Zero Team https://bugs.chromium.org/p/project-zero/issues/detail?id=2018 #exploit #dukeBarman
JEB 3.19.1 is leaked today. You can find it here:
https://forum.reverse4you.org/
#reverse #tools #jeb #leaked
https://forum.reverse4you.org/
#reverse #tools #jeb #leaked
R0 CREW
r0 Crew is a community of low-level information security researchers.
Using Z3 Theorem on AVR Firmware https://medium.com/@ryancor/using-z3-theorem-on-avr-firmware-c6d2f45ac9c2 #reverse #smt
Medium
Using Z3 Theorem on AVR Firmware
As many of you may or may not be aware of, I have a serious obsession with embedded systems security. It wasnβt until about two years agoβ¦
FridaTrace++ β quick & dirty API monitor http://www.hexacorn.com/blog/2020/05/31/fridatrace-quick-dirty-api-monitor/ #frida #reverse #dukeBarman
A Frida based tool that traces usage of the JNI API in Android apps https://github.com/chame1eon/jnitrace #frida #android #reverse #dukeBarman
GitHub
GitHub - chame1eon/jnitrace: A Frida based tool that traces usage of the JNI API in Android apps.
A Frida based tool that traces usage of the JNI API in Android apps. - chame1eon/jnitrace
Applied Reverse Engineering: Accelerated Assembly [P1] https://revers.engineering/applied-re-accelerated-assembly-p1/ #reverse #dukeBarman
Reverse Engineering
Applied Reverse Engineering: Accelerated Assembly [P1] - Reverse Engineering
Part 1 of the x86_64 assembly crash course for people looking to learn how to reverse engineer, read assembly, and understand how exploits work.
Build Your Own iOS 13 Jailbreak Tweak for Beginners - Theos setup, Tweak Development (unc0ver) https://www.youtube.com/watch?v=jGWzc8UIHbk #videos #newbie #ios #dukeBarman
Analyzing Malware Techniques
Fileless Malware - A self loading technique
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-1/
A case of Powershell, Excel 4 Macros and VB6
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-2/
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-3/
Iβm afraid of no packer
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-4/
#reverse #malware #Danus
Fileless Malware - A self loading technique
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-1/
A case of Powershell, Excel 4 Macros and VB6
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-2/
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-3/
Iβm afraid of no packer
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-4/
#reverse #malware #Danus
An IDA Pro Plugin for embedding an IPython Kernel (dark mode!) https://github.com/ChiChou/ida_ipython/tree/dark #reverse #ida #dukeBarman
A post exploitation framework designed to operate covertly on heavily monitored enviroments https://github.com/bats3c/shad0w #exploitation #pentest
GitHub
GitHub - bats3c/shad0w: A post exploitation framework designed to operate covertly on heavily monitored environments
A post exploitation framework designed to operate covertly on heavily monitored environments - bats3c/shad0w
Materials for SSTIC 2020 were published (video, slides and articles) https://www.sstic.org/2020/programme/ #conference #video #dukeBarman
Scoop the Windows 10 Pool! (slides & article) https://www.sstic.org/2020/presentation/pool_overflow_exploitation_since_windows_10_19h1/ #exploitation #windows #dukeBarman
Using Memory Artifacts As Shellcode Emulation Environment (ft. Unicorn Framework) https://darungrim.com/research/2020-06-04-UsingMemoryArtifactsAsShellcodeEmulationEnvironment.html #exploitation #dukeBarman
HugeDomains
DarunGrim.com is for sale | HugeDomains
Find a domain name today. We make it easy.
"Disassembling Linkβs Awakening" - reversing games for gameboy https://kemenaran.winosx.com/posts/category-disassembling-links-awakening/ #reverse #dukeBarman