GIMPLE obfuscator for C, C++, Go, ... all supported GCC targets and front-ends that use GIMPLE https://github.com/meme/hellscape #obfuscation #dukeBarman
GitHub
GitHub - meme/hellscape: GIMPLE obfuscator for C, C++, Go, ... all supported GCC targets and front-ends that use GIMPLE.
GIMPLE obfuscator for C, C++, Go, ... all supported GCC targets and front-ends that use GIMPLE. - meme/hellscape
POC for hexrays pseudo-c to python https://gist.github.com/patois/55bf71413fdf4701dc19cd16fa3020ed #reverse #IDA #dukeBarman
New part - Hardware Debugging for Reverse Engineers Part 2: JTAG, SSDs and Firmware Extraction https://wrongbaud.github.io/jtag-hdd/ #reverse #hardware #dukeBarman
Tool for decrypting the firmware files for Samsung SSDs https://github.com/chrivers/samsung-firmware-magic #reverse #hardware #dukeBarman
GitHub
GitHub - chrivers/samsung-firmware-magic: Tool for decrypting the firmware files for Samsung SSDs
Tool for decrypting the firmware files for Samsung SSDs - chrivers/samsung-firmware-magic
Unpacking HP Firmware Updates - Part 1 https://jsof-tech.com/unpacking-hp-firmware-updates-part-1/ #reverse #hardware #dukeBarman
Hexedit is a plug-in under VIM, which is used to strengthen the hex editing ability of VIM https://github.com/rootkiter/vim-hexedit #reverse #dukeBarman
GitHub
GitHub - rootkiter/vim-hexedit: Hexedit is a plug-in under VIM, which is used to strengthen the hex editing ability of VIM.
Hexedit is a plug-in under VIM, which is used to strengthen the hex editing ability of VIM. - rootkiter/vim-hexedit
Car Hacking with Python β Part 1 Data Exfiltration: GPS and OBDII/CAN Bus https://medium.com/bugbountywriteup/car-hacking-with-python-part-1-data-exfiltration-gps-and-obdii-can-bus-69bc6b101fd1 #reverse #hardware #dukeBarman
Medium
Car Hacking with PythonβββPart 1 Data Exfiltration: GPS and OBDII/CAN Bus
Presented at DEF CON 28 Car Hacking Village.
Decomiler plugin for Visual Studio Code
Demo: https://twitter.com/i/status/1262454414721404928
Download: https://marketplace.visualstudio.com/items?itemName=tintinweb.vscode-decompiler
#reverse #ida #ghidra #dukeBarman
Demo: https://twitter.com/i/status/1262454414721404928
Download: https://marketplace.visualstudio.com/items?itemName=tintinweb.vscode-decompiler
#reverse #ida #ghidra #dukeBarman
A New Look at Old Dragonfly Malware (Goodor) https://norfolkinfosec.com/a-new-look-at-old-dragonfly-malware-goodor/ #reverse #malware #radare2 #dukeBarman
A graphical Mach-O viewer for macOS. Powered by Mach-O Kit. https://github.com/DeVaukz/MachO-Explorer #reverse #macos #ios #dukeBarman
GitHub
GitHub - DeVaukz/MachO-Explorer: A graphical Mach-O viewer for macOS. Powered by Mach-O Kit.
A graphical Mach-O viewer for macOS. Powered by Mach-O Kit. - DeVaukz/MachO-Explorer
The 'S' in Zoom, Stands for Security uncovering (local) security flaws in Zoom's latest macOS client https://objective-see.com/blog/blog_0x56.html #exploit #macos #dukeBarman
objective-see.org
The 'S' in Zoom, Stands for Security
uncovering (local) security flaws in Zoom's latest macOS client
Extracted intel x86 microcode: Five Intel Microcode (uCode) Sequencer's arrays for Atom Goldmont https://github.com/chip-red-pill/glm-ucode #reverse #hardware #dukeBarman
GitHub
GitHub - chip-red-pill/glm-ucode: GLM uCode dumps
GLM uCode dumps . Contribute to chip-red-pill/glm-ucode development by creating an account on GitHub.
Extracting ROM constants from the 8087 math coprocessor's die http://www.righto.com/2020/05/extracting-rom-constants-from-8087-math.html #reverse #hardware #dukeBarman
Righto
Extracting ROM constants from the 8087 math coprocessor's die
Intel introduced the 8087 chip in 1980 to improve floating-point performance on the 8086 and 8088 processors, and it was used with the ori...
Writing an optimizing IL compiler, for dummies, by a dummy: 0x1 Symbolic Expressions Article: https://blog.can.ac/2020/04/11/writing-an-optimizing-il-compiler-for-dummies-by-a-dummy/ #reverse #dukeBarman
blog.can.ac
Writing an optimizing IL compiler, for dummies, by a dummy: 0x1 Symbolic Expressions
<p>Before I begin this series of blog posts, I would like to add a small disclaimer. I have no prior experience or academic knowledge when it comes to compiler development so I might not use the corre
VTIL Project - VTIL (Virtual-machine Translation Intermediate Language) Project is a set of tools that can be used for binary deobfuscation and devirtualization. https://github.com/vtil-project #reverse #dukeBarman
GitHub
VTIL Project
VTIL (Virtual-machine Translation Intermediate Language) Project is a set of tools that can be used for binary deobfuscation and devirtualization. - VTIL Project
InputScope - a tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to automatically expose the secrets of interest https://github.com/OSUSecLab/InputScope #reverse #android #dukeBarman
GitHub
GitHub - OSUSecLab/InputScope: A tool that automatically detects both the execution context of user input validation and also theβ¦
A tool that automatically detects both the execution context of user input validation and also the content involved in the validation, to automatically expose the secrets of interest. - OSUSecLab/I...
Radare2 gui - Cutter team publishes Community Survey for 2020! π₯³ Whether you are using Cutter or not, plz, take 5 minutes to help developers improve Cutter for you https://cutter.re/cutter-community-survey-2020 #reverse #radare2 #dukeBarman
Cutter
Cutter Community Survey 2020
Our 2020 community survey is here and this is our opportunity to get to know you better.