Easily examine and understand any Windows system's hardware and software capability to prevent Meltdown and Spectre attacks.
https://www.grc.com/inspectre.htm
#tools #darw1n
https://www.grc.com/inspectre.htm
#tools #darw1n
Grc
GRC | InSpectre
InSpectre - Inspect Windows Meltdown and Spectre Vulnerability
Updates to XNU debugging tutorial https://www.hex-rays.com/blog/updates-to-xnu-debugging-tutorial/ #debugger #ida #ios #macos #dukeBarman
Patch Diffing a Cisco RV110W Firmware Update (Part II) https://quentinkaiser.be/exploitdev/2020/10/01/patch-diffing-cisco-rv110/ #reverse #ghidra #hardware #dukeBarman
QTNKSR
Patch Diffing a Cisco RV110W Firmware Update (Part II)
This is the second part of a two part blog series on patch diffing Cisco RV firmware where I try to identify fixed flaws (namely CVE-2020-3323, CVE-2020-3330, and CVE-2020-3332). In the first part we identified the static credentials present in Cisco RV110β¦
IDA Home Cloud-based Decompilers Beta Testing
https://www.hex-rays.com/products/idahome/ida-home-cloud-based-decompilers-beta-testing/
#reverse #ida #KosBeg
https://www.hex-rays.com/products/idahome/ida-home-cloud-based-decompilers-beta-testing/
#reverse #ida #KosBeg
Reversing C++ Without Getting a Heart Attack β DEvirtualize VIrtual Calls With Devi https://insinuator.net/2020/11/reversing-c-without-getting-a-heart-attack-devirtualize-virtual-calls-with-devi/ #reverse #ghidra #dukeBarman
Igorβs tip of the week #15: Comments in structures and enums https://www.hex-rays.com/blog/igor-tip-of-the-week-15-comments-in-structures-and-enums/ #reverse #ida #dukeBarman
Slides: "Hypervisor Vulnerability Research: State of the Art" (with a deep focus on Hyper-V & ESXi) https://alisa.sh/slides/HypervisorVulnerabilityResearch2020.pdf #exploitation #dukeBarman
Modern attacks on the Chrome browser : optimizations and deoptimizations https://doar-e.github.io/blog/2020/11/17/modern-attacks-on-the-chrome-browser-optimizations-and-deoptimizations/ #exploitation #dukeBarman
doar-e.github.io
Modern attacks on the Chrome browser : optimizations and deoptimizations
Ghidra Extension to integrate BinDiff for function matching https://github.com/ubfx/BinDiffHelper #reverse #ghidra #dukeBarman
GitHub
GitHub - ubfx/BinDiffHelper: Ghidra Extension to integrate BinDiff for function matching
Ghidra Extension to integrate BinDiff for function matching - ubfx/BinDiffHelper
New release CHIPSEC 1.5.7 https://github.com/chipsec/chipsec/releases/tag/1.5.7 #reverse #hardware #uefi #dukeBarman
GitHub
Release Chipsec v1.5.7 Β· chipsec/chipsec
New or Updated Modules/UtilCmds:
utilcmd.iommu_cmd - Updated command to use argparse
utilcmd.mem_cmd - Updated command to use argparse
utilcmd.msr_cmd - Updated command to use argparse
utilcmd.smb...
utilcmd.iommu_cmd - Updated command to use argparse
utilcmd.mem_cmd - Updated command to use argparse
utilcmd.msr_cmd - Updated command to use argparse
utilcmd.smb...
InfoSec Black Friday Deals 2020 (updated). Enjoy! https://github.com/0x90n/InfoSec-Black-Friday and https://github.com/Securityinfos/Black-Friday-Deals #dukeBarman
GitHub
GitHub - 0x90n/InfoSec-Black-Friday: All the deals for InfoSec related software/tools this Black Friday
All the deals for InfoSec related software/tools this Black Friday - 0x90n/InfoSec-Black-Friday
The tool allows you to assemble and disassemble BIOS Guard script https://github.com/allowitsme/big-tool #reverse #hardware #uefi #dukeBarman
GitHub
GitHub - allowitsme/big-tool: BIOS Guard script tool
BIOS Guard script tool. Contribute to allowitsme/big-tool development by creating an account on GitHub.
Linux Kernel Adventures: Reversing and Exploiting a Linux Driver https://media.handmade-seattle.com/linux-kernel-adventures/ #exploitation #linux
Big Match: matching open source code in binaries for fun and profit https://rev.ng/blog/big-match/post.html #reverse #dukeBarman
PTM - Page Table Manipulation From Usermode https://back.engineering/01/12/2020/ #exploitation #windows
Private Group Of Back Engineers
PTM - Page Table Manipulation From Usermode
PTM is a Windows 10 C++ library that allows a programmer to manipulate all memory, physical, and virtual from user-mode. The project inherits an interface from VDM allowing the use of a physical memory read-write primitive to fuel this project. VDM is usedβ¦
Fast search and dump dex on memory https://github.com/hluwa/FRIDA-DEXDump #android #reverse #dukeBarman
GitHub
GitHub - hluwa/frida-dexdump: A frida tool to dump dex in memory to support security engineers analyzing malware.
A frida tool to dump dex in memory to support security engineers analyzing malware. - hluwa/frida-dexdump
Hexagon processor module for IDA Pro disassembler https://github.com/n-o-o-n/idp_hexagon #reverse #ida #dukeBarman
GitHub
GitHub - n-o-o-n/idp_hexagon: Hexagon processor module for IDA Pro disassembler
Hexagon processor module for IDA Pro disassembler. Contribute to n-o-o-n/idp_hexagon development by creating an account on GitHub.