r0 Crew (Channel)
8.83K subscribers
35 photos
1 video
9 files
1.98K links
Security Related Links:
- Reverse Engineering;
- Malware Research;
- Exploit Development;
- Pentest;
- etc;

Join to chat: @r0crew_bot πŸ‘ˆ

Forum: https://forum.reverse4you.org
Twitter: https://twitter.com/R0_Crew
Download Telegram
Friends, we have good news! πŸ”₯

OFFZONE 2021 is an international practical cybersecurity conference taking place in Moscow, Russia on April 22-23.

No suits, no business β€” only hardcore research.

Save the date! See you at OFFZONE 2021!
Storm - a blackbox mutational fuzzer for detecting critical bugs in SMT solvers Article: https://numairmansur.github.io/STORM.pdf Code: https://github.com/Practical-Formal-Methods/storm #fuzzing #dukeBarman
This three-part series highlights the technical challenges involved in finding and exploiting JavaScript engine vulnerabilities in modern web browsers and evaluates current exploit mitigation technologies. The exploited vulnerability, CVE-2020-9802, was fixed in iOS 13.5, while two of the mitigation bypasses, CVE-2020-9870 and CVE-2020-9910, were fixed in iOS 13.6.

JITSploitation I: A JIT Bug
https://googleprojectzero.blogspot.com/2020/09/jitsploitation-one.html

JITSploitation II: Getting Read/Write
https://googleprojectzero.blogspot.com/2020/09/jitsploitation-two.html

JITSploitation III: Subverting Control Flow
https://googleprojectzero.blogspot.com/2020/09/jitsploitation-three.html

#mobile #ios #javascript #browser #jit #webkit #expdev #cve #reverse #darw1n
VMX intrinsics plugin for Hex-Rays decompiler. The plugin allow to display unhandled VMX instructions into their respective intrinsic form when using the decompiler. Might be useful for those who enjoy reversing hypervisors.

https://github.com/synacktiv/vmx_intrinsics

#reverse #ida #plugin #hypervisor #vmx #darw1n
VolgaCTF 2020 is an international inter-university cybersecurity competition with a local conference taking place in Samara, Russia on September 14-18.

If you have the opportunity, we recommend visiting it!