RCE vulnerability in Avast Antivirus by Project Zero Team https://bugs.chromium.org/p/project-zero/issues/detail?id=2018 #exploit #dukeBarman
JEB 3.19.1 is leaked today. You can find it here:
https://forum.reverse4you.org/
#reverse #tools #jeb #leaked
https://forum.reverse4you.org/
#reverse #tools #jeb #leaked
R0 CREW
r0 Crew is a community of low-level information security researchers.
FridaTrace++ – quick & dirty API monitor http://www.hexacorn.com/blog/2020/05/31/fridatrace-quick-dirty-api-monitor/ #frida #reverse #dukeBarman
A Frida based tool that traces usage of the JNI API in Android apps https://github.com/chame1eon/jnitrace #frida #android #reverse #dukeBarman
GitHub
GitHub - chame1eon/jnitrace: A Frida based tool that traces usage of the JNI API in Android apps.
A Frida based tool that traces usage of the JNI API in Android apps. - chame1eon/jnitrace
Applied Reverse Engineering: Accelerated Assembly [P1] https://revers.engineering/applied-re-accelerated-assembly-p1/ #reverse #dukeBarman
Reverse Engineering
Applied Reverse Engineering: Accelerated Assembly [P1] - Reverse Engineering
Part 1 of the x86_64 assembly crash course for people looking to learn how to reverse engineer, read assembly, and understand how exploits work.
Build Your Own iOS 13 Jailbreak Tweak for Beginners - Theos setup, Tweak Development (unc0ver) https://www.youtube.com/watch?v=jGWzc8UIHbk #videos #newbie #ios #dukeBarman
Analyzing Malware Techniques
Fileless Malware - A self loading technique
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-1/
A case of Powershell, Excel 4 Macros and VB6
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-2/
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-3/
I’m afraid of no packer
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-4/
#reverse #malware #Danus
Fileless Malware - A self loading technique
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-1/
A case of Powershell, Excel 4 Macros and VB6
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-2/
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-3/
I’m afraid of no packer
https://danusminimus.github.io/Analyzing-Modern-Malware-Techniques-Part-4/
#reverse #malware #Danus
An IDA Pro Plugin for embedding an IPython Kernel (dark mode!) https://github.com/ChiChou/ida_ipython/tree/dark #reverse #ida #dukeBarman
A post exploitation framework designed to operate covertly on heavily monitored enviroments https://github.com/bats3c/shad0w #exploitation #pentest
GitHub
GitHub - bats3c/shad0w: A post exploitation framework designed to operate covertly on heavily monitored environments
A post exploitation framework designed to operate covertly on heavily monitored environments - bats3c/shad0w
Materials for SSTIC 2020 were published (video, slides and articles) https://www.sstic.org/2020/programme/ #conference #video #dukeBarman
Scoop the Windows 10 Pool! (slides & article) https://www.sstic.org/2020/presentation/pool_overflow_exploitation_since_windows_10_19h1/ #exploitation #windows #dukeBarman
Using Memory Artifacts As Shellcode Emulation Environment (ft. Unicorn Framework) https://darungrim.com/research/2020-06-04-UsingMemoryArtifactsAsShellcodeEmulationEnvironment.html #exploitation #dukeBarman
HugeDomains
DarunGrim.com is for sale | HugeDomains
Find a domain name today. We make it easy.
"Disassembling Link’s Awakening" - reversing games for gameboy https://kemenaran.winosx.com/posts/category-disassembling-links-awakening/ #reverse #dukeBarman
A lightweight dynamic instrumentation library https://github.com/googleprojectzero/TinyInst #reverse #dukeBarman
GitHub
GitHub - googleprojectzero/TinyInst: A lightweight dynamic instrumentation library
A lightweight dynamic instrumentation library. Contribute to googleprojectzero/TinyInst development by creating an account on GitHub.
abyss - IDAPython Plugin for Postprocessing of Hexrays Decompiler Output https://github.com/patois/abyss #ida #reverse #dukeBarman
GitHub
GitHub - patois/abyss: abyss - augmentation of Hexrays decompiler output
abyss - augmentation of Hexrays decompiler output. Contribute to patois/abyss development by creating an account on GitHub.
An integration for IDA and VS Code which connects both to easily execute and debug IDAPython scripts https://github.com/ioncodes/idacode #reverse #ida #dukeBarman
GitHub
GitHub - ioncodes/idacode: An integration for IDA and VS Code which connects both to easily execute and debug IDAPython scripts.
An integration for IDA and VS Code which connects both to easily execute and debug IDAPython scripts. - ioncodes/idacode
June 10 will be an online meeting (lang RU) on the topic of information security from Digital Security.
In addition to presentations at the meeting there will be a small online CTF and a Kahoot game with gifts.
Starts at 17:00, end at 21:00.
Registration required (it’s free).
https://digital-securityi-serv.timepad.ru/event/1313810/ #event #darw1n
In addition to presentations at the meeting there will be a small online CTF and a Kahoot game with gifts.
Starts at 17:00, end at 21:00.
Registration required (it’s free).
https://digital-securityi-serv.timepad.ru/event/1313810/ #event #darw1n
digital-securityi-serv.timepad.ru
Онлайн-встреча по информационной безопасности Digital Security ON AIR / События на TimePad.ru
10 июня присоединяйтесь к онлайн-встрече по информационной безопасности Digital Security ON AIR.
Стартуем в 17:00, закончить планируем в 20:00. В программе доклады на актуальные темы ИБ, небольшой online CTF, а также игра Kahoot с призами. Вход свободный.
Стартуем в 17:00, закончить планируем в 20:00. В программе доклады на актуальные темы ИБ, небольшой online CTF, а также игра Kahoot с призами. Вход свободный.
Defeating Stack Canary, PIE and DEP on remote 64 bit server with byte wise bruteforce https://www.ret2rop.com/2020/05/canary-pie-byte-bruteforce.html #exploitation #dukeBarman