LaunchWinAFL Usage:
1) Install dynamorio and winafl
2) add https://gist.github.com/richinseattle/613105953003ec5e1f24ca17b2d8541f to ghidra scripts, set some one-time config at top; install paths, etc
3) load target exe & coverage dlls into ghidra
4) go to target function in disasm
5) run script to start fuzzing!
#ghidra #fuzzing #dukeBarman
1) Install dynamorio and winafl
2) add https://gist.github.com/richinseattle/613105953003ec5e1f24ca17b2d8541f to ghidra scripts, set some one-time config at top; install paths, etc
3) load target exe & coverage dlls into ghidra
4) go to target function in disasm
5) run script to start fuzzing!
#ghidra #fuzzing #dukeBarman
Gist
LaunchWinAFL.java
GitHub Gist: instantly share code, notes, and snippets.
In this episode, Mark Downie shows "Time Travel Debugging" https://channel9.msdn.com/Shows/Visual-Studio-Toolbox/Time-Travel-Debugging #debugger #dukeBarman
Docs
Time Travel Debugging
In this episode, Robert is joined by Mark Downie, who shows us Time Travel Debugging. provides the ability to record a Web app running on a Azure Virtual Machine (VM) and then accurately reconstruct and replay the execution path. You can record code executed…
Ret-sync now supports Ghidra (syncing with popular debuggers) https://github.com/bootleg/ret-sync #ghidra #reverse #debugger #dukeBarman
GitHub
GitHub - bootleg/ret-sync: ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg)…
ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja disassemblers. - bootleg/ret-sync
MrsPicky - An IDAPython decompiler script that helps auditing calls to the memcpy(dst, src, n) and memmove(dst, c, n) functions. https://github.com/patois/mrspicky #ida #dukeBarman
GitHub
GitHub - patois/mrspicky: MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls
MrsPicky - An IDAPython decompiler script that helps auditing memcpy() and memmove() calls - patois/mrspicky
Razzer: Finding kernel race bugs through fuzzing https://github.com/compsec-snu/razzer #fuzzing #linux #dukeBarman
GitHub
GitHub - compsec-snu/razzer: A Kernel fuzzer focusing on race bugs
A Kernel fuzzer focusing on race bugs. Contribute to compsec-snu/razzer development by creating an account on GitHub.
Unpacking ASIC firmware: AntMiner Exploited https://serhack.me/articles/unpacking-asic-firmware-antminer-exploited #hardware #reverse #dukeBarman
SerHack – Security Research
Unpacking ASIC firmware: AntMiner Exploited – SerHack Blog
Unpacking and reverse engineering of Bitmain AntMiner Z11 firmware.
Pandemic binary program analysis framework in OCaml https://github.com/RolfRolles/PandemicML #reverse #ocaml #dukeBarman
GitHub
GitHub - RolfRolles/PandemicML: Pandemic binary program analysis framework in OCaml (abandoned)
Pandemic binary program analysis framework in OCaml (abandoned) - RolfRolles/PandemicML
Program of OFFZONE 2019 was announced https://offzone.moscow/program/ #conference #offzone #dukeBarman
"Building universal Android rooting with a type confusion vulnerability" (Zerocon 2019) Slides: https://github.com/ThomasKing2014/slides/blob/master/Building%20universal%20Android%20rooting%20with%20a%20type%20confusion%20vulnerability.pdf Demo: https://www.youtube.com/watch?v=zHEQ8fOLSrM&feature=youtu.be #android #exploitation #dukeBarman
Implementing a New CPU Architecture for Ghidra https://docs.google.com/presentation/d/1b955DV2ii-Dgv6YR4kUrJtjGugEqXD3FffTHRfvVSYo/ #ghidra #reverse #dukeBarman
Google Docs
flashre - BeeRump
Implementing a New CPU Architecture for Ghidra @guedou BeeRump Before the talk zoom the presenter notes CTRL + ALT + / || CTRL + F4
s2e was updated! Added support for FP/MMX/SSE registers, improve performance. http://s2e.systems/releases/ #reverse #dukeBarman
Forwarded from Noise Security Bit
Специально для проекта NoiSeBit мы разыгрываем 3 инвайта на конференцию OFFZONE (offzone.moscow)!! 👻 Для участия нужно ответить правильно на вопрос:
- Что общего у названия OFFZONE c Offensive Research? (правильный ответ прозвучал в нашем последнем выпуске)
Для участия в розыгрыше нужно быть нашим подписчиком и написать ответ в нашем твиттере в комментарии к https://twitter.com/N0iSeBit/status/1134368038898155521 В субботу в 23:00 мы объявим 3 победителей. Удачи! 🤪
- Что общего у названия OFFZONE c Offensive Research? (правильный ответ прозвучал в нашем последнем выпуске)
Для участия в розыгрыше нужно быть нашим подписчиком и написать ответ в нашем твиттере в комментарии к https://twitter.com/N0iSeBit/status/1134368038898155521 В субботу в 23:00 мы объявим 3 победителей. Удачи! 🤪
X (formerly Twitter)
Noise Security Bit (@N0iSeBit) on X
#NoiSeBit разыгрывает 3 инвайта на конференцию @offzone_moscow!! Для у участия нужно ответить на вопрос опубликованный на нашем канале https://t.co/93GMBF6z2g, быть нашим подписчиком и написать правильный ответ в комментарии. В субботу в 23:00 мы объявим…
Analysis of a 1day (CVE-2019-0547) and discovery of a forgotten condition in the patch (CVE-2019-0726) – Part 1 of 2 https://sensepost.com/blog/2019/analysis-of-a-1day-cve-2019-0547-and-discovery-of-a-forgotten-condition-in-the-patch-cve-2019-0726-part-1-of-2/ #exploitation #reverse #dukeBarman
Sensepost
SensePost | Analysis of a 1day (cve-2019-0547) and discovery of a forgotten condition in the patch (cve-2019-0726) – part 1 of…
Leaders in Information Security
Reverse-engineering Samsung S10 TEEGRIS TrustZone OS http://allsoftwaresucks.blogspot.com/2019/05/reverse-engineering-samsung-exynos-9820.html #reverse #ghidra #mobile #dukeBarman
Blogspot
Reverse-engineering Samsung Exynos 9820 bootloader and TZ
Reverse-engineering Samsung S10 TEEGRIS TrustZone OS It's been a while since my last post, huh? Even though I have quite a lot of stuff I...
Overcoming Fear: Reversing With Radare2 - Arnau Gamez Montolio https://www.youtube.com/watch?v=317dNavABKo #radare2 #conference #reverse #dukeBarman
YouTube
#HITB2019AMS D1T3 - Overcoming Fear: Reversing With Radare2 - Arnau Gamez Montolio
The well-known free and open source reverse engineering framework radare2 is becoming more popular among the computer security community with a large variety of people using it to deal with all kinds of different situations: from hobbyist CTF players to professional…
Time travel debugging: It’s a blast! (from the past) https://blogs.technet.microsoft.com/srd/2019/05/29/time-travel-debugging-its-a-blast-from-the-past/ #debugger #dukeBarman
Videos from HITBSecConf2019 – Amsterdam. Enjoy! https://www.youtube.com/watch?v=L9NhN9DMZno&list=PLmv8T5-GONwSuU8vMeZ6ECvr4NqJJxm34 #video #conference #dukeBarman
YouTube
#HITB2019AMS PRECONF PREVIEW - The End Is The Beginning Is The End: Ten Years In The NL Box
Dhillon 'L33tdawg' Kannabhiran
Founder/Chief Executive Officer, Hack In The Box
=======
Time flies when you’re having fun! It flies even faster when you’re having fun with friends!
From the back alleys of Kuala Lumpur, to the sand dunes of the UAE – from…
Founder/Chief Executive Officer, Hack In The Box
=======
Time flies when you’re having fun! It flies even faster when you’re having fun with friends!
From the back alleys of Kuala Lumpur, to the sand dunes of the UAE – from…
Forwarded from OFFZONE
Выходим на финишную прямую! 💫
Сегодня последний день скидки Early Birds на билеты OFFZONE 2019 🔥
Покупаем здесь: https://goo.gl/TyC2sW
Сегодня последний день скидки Early Birds на билеты OFFZONE 2019 🔥
Покупаем здесь: https://goo.gl/TyC2sW
Ghidra utilities for analyzing firmware https://github.com/al3xtjames/ghidra-firmware-utils #hardware #reverse #ghidra #dukeBarman
GitHub
GitHub - al3xtjames/ghidra-firmware-utils: Ghidra utilities for analyzing PC firmware
Ghidra utilities for analyzing PC firmware. Contribute to al3xtjames/ghidra-firmware-utils development by creating an account on GitHub.