Python 3.9 support for IDA 7.5 https://www.hex-rays.com/blog/python-3-9-support-for-ida-7-5/ #reverse #ida #dukeBarman
Ghidra Decompiler Plugin for IDA Pro https://github.com/GregoryMorse/GhidraDec #reverse #ida #dukeBarman
GitHub
GitHub - GregoryMorse/GhidraDec: Ghidra Decompiler Plugin for IDA Pro
Ghidra Decompiler Plugin for IDA Pro. Contribute to GregoryMorse/GhidraDec development by creating an account on GitHub.
This is for the Pwners: Exploiting a WebKit 0-day in PlayStation 4 https://www.synacktiv.com/publications/this-is-for-the-pwners-exploiting-a-webkit-0-day-in-playstation-4.html #exploitation #hardware #dukeBarman
Synacktiv
This is for the Pwners: Exploiting a WebKit 0-day in PlayStation 4
Black Hat Europe 2020 slides https://www.blackhat.com/eu-20/briefings/schedule/ #conference #blackhat #dukeBarman
Blackhat
Black Hat Europe 2020
[PT007] Simulating and hunting firmware vulnerabilities with Qiling https://blog.vincss.net/2020/12/pt007-simulating-and-hunting-firmware-vulnerabilities-with-Qiling.html #reverse #ghidra #hardware #dukeBarman
[LEAKED] IDA Pro 7.5 + HexRays (x86/x64/ARM/ARM64)
https://twitter.com/R0_CREW/status/1338816289343672321
#reverse #ida #leaked
https://twitter.com/R0_CREW/status/1338816289343672321
#reverse #ida #leaked
Twitter
R0 CREW
[LEAKED] IDA Pro 7.5 + HexRays (x86/x64/ARM/ARM64) forum.reverse4you.org/t/leaked-ida-pβ¦
Investigating IDA Lumina feature ("creating own lumina server")
Article: https://www.synacktiv.com/publications/investigating-ida-lumina-feature.html
Code: https://github.com/synacktiv/lumina_server
#reverse #ida #dukeBarman
Article: https://www.synacktiv.com/publications/investigating-ida-lumina-feature.html
Code: https://github.com/synacktiv/lumina_server
#reverse #ida #dukeBarman
Synacktiv
Investigating IDA Lumina feature
Android Reverse Engineering WorkBench for VS Code https://github.com/Surendrajat/APKLab #reverse #android #dukeBarman
GitHub
GitHub - APKLab/APKLab: Android Reverse-Engineering Workbench for VS Code
Android Reverse-Engineering Workbench for VS Code. Contribute to APKLab/APKLab development by creating an account on GitHub.
efiXplorer v3.0 [#BHEU Edition] was released. Some new features:
- EFI modules dependency graph
- potential vulnerability checkers (SMM callout and GetVariable PEI/DXE/SMM)
https://github.com/binarly-io/efiXplorer/releases/tag/v3.0
#reverse #ida #uefi #dukeBarman
- EFI modules dependency graph
- potential vulnerability checkers (SMM callout and GetVariable PEI/DXE/SMM)
https://github.com/binarly-io/efiXplorer/releases/tag/v3.0
#reverse #ida #uefi #dukeBarman
GitHub
Release efiXplorer v3.0 [BHEU Edition] Β· binarly-io/efiXplorer
Release notes:
EFI modules dependency graph inside efiXloader
Potential vulnerability checkers:
SMM callout
GetVariable (PEI/DXE/SMM)
Multiple improvements and bugfixes
EFI modules dependency graph inside efiXloader
Potential vulnerability checkers:
SMM callout
GetVariable (PEI/DXE/SMM)
Multiple improvements and bugfixes
UTK Web a visual toolkit for exploring and editing firmware images, running on web platforms https://github.com/orangecms/utk-web #reverse #uefi #hardware #dukeBarman
GitHub
GitHub - fiedka/fiedka: a visual toolkit for exploring and editing firmware images, running on web platforms
a visual toolkit for exploring and editing firmware images, running on web platforms - fiedka/fiedka
Go package that aids in binary analysis and exploitation https://github.com/zznop/sploit #reverse #exploitation #dukeBarman
GitHub
GitHub - zznop/sploit: Go package that aids in binary analysis and exploitation
Go package that aids in binary analysis and exploitation - zznop/sploit
Radare2 5.0.0 was released - codename: phoenix https://github.com/radareorg/radare2/releases/tag/5.0.0 #reverse #radare2 #dukeBarman
GitHub
Release 5.0.0 - codename: phoenix Β· radareorg/radare2
r2-5.0
Commits: 510
Contributors: 65
Interface
Added the Comma API
Added r_str_wrap() and r_cons_printat() APIs
Fix adding comments in panels
Improved help messages
Removed problematic fortunes
Ad...
Commits: 510
Contributors: 65
Interface
Added the Comma API
Added r_str_wrap() and r_cons_printat() APIs
Fix adding comments in panels
Improved help messages
Removed problematic fortunes
Ad...
Project Zero: An iOS hacker tries Android https://googleprojectzero.blogspot.com/2020/12/an-ios-hacker-tries-android.html #android #exploitation #dukeBarman
Blogspot
An iOS hacker tries Android
Written by Brandon Azad, when working at Project Zero One of the amazing aspects of working at Project Zero is having the flexibility to dir...
Visualize the virtual address space of a Windows process on a Hilbert curve https://github.com/0vercl0k/clairvoyance #reverse #windows #dukeBarman
GitHub
GitHub - 0vercl0k/clairvoyance: Visualize the virtual address space of a Windows process on a Hilbert curve.
Visualize the virtual address space of a Windows process on a Hilbert curve. - 0vercl0k/clairvoyance
A comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures https://github.com/mytechnotalent/Reverse-Engineering-Tutorial #reverse #dukeBarman
GitHub
GitHub - mytechnotalent/Reverse-Engineering: A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bitβ¦
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures. - mytechnotalent/Reverse-Engineering
Hacking the Nintendo Game & Watch https://www.youtube.com/watch?v=rLT9c4Miesw #reverse #hardware #dukeBarman
YouTube
rC3 Talk: Hacking the Game & Watch
At this year's Chaos Computer Club congress, called the rC3, I gave a talk about the adventures of hacking the Game & Watch. This is the recording of that talk, I hope you enjoy it!
The official recording, including Q&A can be found here: https://media.ccc.de/v/rc3β¦
The official recording, including Q&A can be found here: https://media.ccc.de/v/rc3β¦