serialsh - safety net against bootloop (reverse engineering session): spawn a shell over serial. https://github.com/haiyuidesu/serialsh #ios #dukeBarman
GitHub
GitHub - haiyuidesu/serialsh: safety net against bootloop
safety net against bootloop. Contribute to haiyuidesu/serialsh development by creating an account on GitHub.
Special IDA Pro tools for the Sega Genesis/Megadrive romhackers https://github.com/lab313ru/smd_ida_tools #reverse #ida #dukeBarman
GitHub
GitHub - lab313ru/smd_ida_tools: Special IDA Pro tools for the Sega Genesis/Megadrive romhackers
Special IDA Pro tools for the Sega Genesis/Megadrive romhackers - lab313ru/smd_ida_tools
FUZZING FOR BEGINNERS - using American fuzzy lop https://www.youtube.com/watch?v=O3hb6HV1ZQo #fuzzing #video #newbie #dukeBarman
YouTube
FUZZING FOR BEGINNERS (KUGG teaches STÖK American fuzzy lop)
In this episode of "STÖK, time to learn something new". KUGG (Christoffer Jerkeby) From F-Secure shows STÖK the basics of FUZZING using American Fuzzy lop. They FUZZ a HTTP server and get two crashes, crashes that with the right exploit could give an attacker…
A BinaryNinja plugin to graph a BNIL instruction tree https://github.com/withzombies/bnil-graph #reverse #binaryninja #dukeBarman
GitHub
GitHub - withzombies/bnil-graph: A BinaryNinja plugin to graph a BNIL instruction tree
A BinaryNinja plugin to graph a BNIL instruction tree - withzombies/bnil-graph
Tracing iOS Kernel Functions - Building a Kernel Function Trace Tool for Security Research https://www.youtube.com/watch?v=qm_oLQFGRsQ #ios #reverse #video #dukeBarman
How Windows is solving uninitialized stack memory for C/C++ code https://msrc-blog.microsoft.com/2020/05/13/solving-uninitialized-stack-memory-on-windows/ #reverse #windows #dukeBarman
Microsoft
Solving Uninitialized Stack Memory on Windows | MSRC Blog
| Microsoft Security Response Center
| Microsoft Security Response Center
This blog post outlines the work that Microsoft is doing to eliminate uninitialized stack memory vulnerabilities from Windows and why we’re on this path.
This blog post will be broken down into a few parts that folks can jump to:
Uninitialized Memory Background…
This blog post will be broken down into a few parts that folks can jump to:
Uninitialized Memory Background…
Hacktory - Immersive cybersecurity educational platform (included two free courses: web security and java secure programming) https://hacktory.ai/ #exploitation #pentest
GIMPLE obfuscator for C, C++, Go, ... all supported GCC targets and front-ends that use GIMPLE https://github.com/meme/hellscape #obfuscation #dukeBarman
GitHub
GitHub - meme/hellscape: GIMPLE obfuscator for C, C++, Go, ... all supported GCC targets and front-ends that use GIMPLE.
GIMPLE obfuscator for C, C++, Go, ... all supported GCC targets and front-ends that use GIMPLE. - meme/hellscape
POC for hexrays pseudo-c to python https://gist.github.com/patois/55bf71413fdf4701dc19cd16fa3020ed #reverse #IDA #dukeBarman
New part - Hardware Debugging for Reverse Engineers Part 2: JTAG, SSDs and Firmware Extraction https://wrongbaud.github.io/jtag-hdd/ #reverse #hardware #dukeBarman
Tool for decrypting the firmware files for Samsung SSDs https://github.com/chrivers/samsung-firmware-magic #reverse #hardware #dukeBarman
GitHub
GitHub - chrivers/samsung-firmware-magic: Tool for decrypting the firmware files for Samsung SSDs
Tool for decrypting the firmware files for Samsung SSDs - chrivers/samsung-firmware-magic
Unpacking HP Firmware Updates - Part 1 https://jsof-tech.com/unpacking-hp-firmware-updates-part-1/ #reverse #hardware #dukeBarman
Hexedit is a plug-in under VIM, which is used to strengthen the hex editing ability of VIM https://github.com/rootkiter/vim-hexedit #reverse #dukeBarman
GitHub
GitHub - rootkiter/vim-hexedit: Hexedit is a plug-in under VIM, which is used to strengthen the hex editing ability of VIM.
Hexedit is a plug-in under VIM, which is used to strengthen the hex editing ability of VIM. - rootkiter/vim-hexedit
Car Hacking with Python — Part 1 Data Exfiltration: GPS and OBDII/CAN Bus https://medium.com/bugbountywriteup/car-hacking-with-python-part-1-data-exfiltration-gps-and-obdii-can-bus-69bc6b101fd1 #reverse #hardware #dukeBarman
Medium
Car Hacking with Python — Part 1 Data Exfiltration: GPS and OBDII/CAN Bus
Presented at DEF CON 28 Car Hacking Village.
Decomiler plugin for Visual Studio Code
Demo: https://twitter.com/i/status/1262454414721404928
Download: https://marketplace.visualstudio.com/items?itemName=tintinweb.vscode-decompiler
#reverse #ida #ghidra #dukeBarman
Demo: https://twitter.com/i/status/1262454414721404928
Download: https://marketplace.visualstudio.com/items?itemName=tintinweb.vscode-decompiler
#reverse #ida #ghidra #dukeBarman
A New Look at Old Dragonfly Malware (Goodor) https://norfolkinfosec.com/a-new-look-at-old-dragonfly-malware-goodor/ #reverse #malware #radare2 #dukeBarman
A graphical Mach-O viewer for macOS. Powered by Mach-O Kit. https://github.com/DeVaukz/MachO-Explorer #reverse #macos #ios #dukeBarman
GitHub
GitHub - DeVaukz/MachO-Explorer: A graphical Mach-O viewer for macOS. Powered by Mach-O Kit.
A graphical Mach-O viewer for macOS. Powered by Mach-O Kit. - DeVaukz/MachO-Explorer