Open Source Security Foundation (OpenSSF): Reflection and Future https://www.linuxfoundation.org/en/blog/openssf-reflection-and-future/ #security #linux #dukeBarman
Now you can give to a hacky debugger Voltron another chance. New maintainer zcutlip promises updates and ask to feedback in issues and PR https://github.com/snare/voltron #reverse #debugger #gdb #lldb #dukeBarman
GitHub
GitHub - snare/voltron: A hacky debugger UI for hackers
A hacky debugger UI for hackers. Contribute to snare/voltron development by creating an account on GitHub.
Write Windows Shellcode in Rust https://github.com/b1tg/rust-windows-shellcode #reverse #exploitation #dukeBarman
GitHub
GitHub - b1tg/rust-windows-shellcode: Windows shellcode development in Rust
Windows shellcode development in Rust. Contribute to b1tg/rust-windows-shellcode development by creating an account on GitHub.
In-depth dive into the security features of the Intel/Windows platform secure boot process
https://igor-blue.github.io/2021/02/04/secure-boot.html
#uefi #hardware #jeisonwi
https://igor-blue.github.io/2021/02/04/secure-boot.html
#uefi #hardware #jeisonwi
Igor's Blog
In-depth dive into the security features of the Intel/Windows platform secure boot process
Introduction and System Architecture Buses More Components The Flash Chip Overview Early power on Bring-Up (BUP) CPU initialization UEFI initialization Loading the boot loader Windows Boot β¦
Unnamed Reverse Engineering Podcast 045 - Rizin and Cutter https://unnamedre.com/episode/45 #reverse #rizin #podcasts #dukeBarman
Unnamedre
045 - Rizin and Cutter
An Interview with Itay Cohen and Florian MΓ€rkl
Multi-disassemblers collaboration framework for reverse engineering https://github.com/Martyx00/CollaRE #reverse #ghidra #rizin #ida #binaryninja #dukeBarman
GitHub
GitHub - Martyx00/CollaRE: Multi-tool reverse engineering collaboration solution.
Multi-tool reverse engineering collaboration solution. - Martyx00/CollaRE
Black Hat USA 2020 materials https://www.youtube.com/watch?v=kyqeBGNSEIc&list=PLH15HpR5qRsXE_4kOSy_SXwFkFQre4AV_ #video #conference #blackhat #dukeBarman
YouTube
Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant
Google Cloud's security model in many ways is quite different from AWS. Spark jobs, Cloud Functions, Jupyter Notebooks, and more default to having administrative capabilities over cloud API's. Instead of defaulting to no capabilities, permissions are grantedβ¦
π1
π’ ZN 2021: new time and place
Nothing can compare to the energy of live conversation. ZN 2021 will take place at Sevkabel Port, St Petersburg on June, 30.
Early registration is available. Use promocode EARLYBIRD to get 20% off till the end of March
https://zeronights.ru
#ZN #ZeroNights #conference
Nothing can compare to the energy of live conversation. ZN 2021 will take place at Sevkabel Port, St Petersburg on June, 30.
Early registration is available. Use promocode EARLYBIRD to get 20% off till the end of March
https://zeronights.ru
#ZN #ZeroNights #conference
Wubes is like Qubes but for Windows. The idea is to leverage the Windows Sandbox technology to spawn applications in isolation. https://github.com/nccgroup/Wubes #windows #security #dukeBarman
GitHub
GitHub - nccgroup/Wubes: Qubes containerization on Windows
Qubes containerization on Windows . Contribute to nccgroup/Wubes development by creating an account on GitHub.
KOPYCAT - Linux Kernel module-less implant (backdoor) https://github.com/milabs/kopycat #linux #exploitation
GitHub
GitHub - milabs/kopycat: Linux Kernel module-less implant (backdoor)
Linux Kernel module-less implant (backdoor). Contribute to milabs/kopycat development by creating an account on GitHub.
https://github.com/PositiveTechnologies/ghidra_nodejs
GHIDRA plugin to parse, disassemble and decompile NodeJS Bytenode (JSC) binaries
#ghidra #decompiler #nodejs #reverse #DrMefistO
GHIDRA plugin to parse, disassemble and decompile NodeJS Bytenode (JSC) binaries
#ghidra #decompiler #nodejs #reverse #DrMefistO
GitHub
GitHub - PositiveTechnologies/ghidra_nodejs: GHIDRA plugin to parse, disassemble and decompile NodeJS Bytenode (JSC) binaries
GHIDRA plugin to parse, disassemble and decompile NodeJS Bytenode (JSC) binaries - PositiveTechnologies/ghidra_nodejs
Flowers and chocolate cannot do what the words of love can. ππ°
Every woman in our lives is unique and beautiful. π
The power of they have inside is enormous. ππ
They are stronger than anyone can imagine. πͺπ
And we all know that this world would mean nothing without a woman. π©ββ€οΈβπ¨π¨βπ©βπ§βπ¦
So, on this special day we have an amazing opportunity to thank all of them! π₯°
Thank you for making life possible, thank you for being so different and strong! πβοΈπ¨βπ³
π₯³ Happy Womenβs Day! β¨π₯
Every woman in our lives is unique and beautiful. π
The power of they have inside is enormous. ππ
They are stronger than anyone can imagine. πͺπ
And we all know that this world would mean nothing without a woman. π©ββ€οΈβπ¨π¨βπ©βπ§βπ¦
So, on this special day we have an amazing opportunity to thank all of them! π₯°
Thank you for making life possible, thank you for being so different and strong! πβοΈπ¨βπ³
π₯³ Happy Womenβs Day! β¨π₯
Rizin and Cutter have been selected for Google Summer of Code 2021! Great opportunity for students to work with developer's teams, write code and learn about open-source! https://summerofcode.withgoogle.com/organizations/5718117306597376/ #reverse #rizin #opensource #dukeBarman
Withgoogle
Google Summer of Code
Google Summer of Code is a global program focused on bringing more developers into open source software development.
Hyper-V memory internals. Guest OS memory access
https://hvinternals.blogspot.com/2019/09/hyper-v-memory-internals-guest-os-memory-access.html
#reverse #hyperv #internals #darw1n
https://hvinternals.blogspot.com/2019/09/hyper-v-memory-internals-guest-os-memory-access.html
#reverse #hyperv #internals #darw1n
Blogspot
Hyper-V memory internals. Guest OS memory access
hyper-v internals
Hyper-V memory internals. EXO partition memory access
https://hvinternals.blogspot.com/2020/06/hyper-v-memory-internals-exo-partition.html
#reverse #hyperv #internals #darw1n
https://hvinternals.blogspot.com/2020/06/hyper-v-memory-internals-exo-partition.html
#reverse #hyperv #internals #darw1n
Blogspot
Hyper-V memory internals. EXO partition memory access
hyper-v internals
Hyper-V debugging for beginners (2nd edition)
https://hvinternals.blogspot.com/2021/01/hyper-v-debugging-for-beginners-2nd.html
#reverse #hyperv #internals #darw1n
https://hvinternals.blogspot.com/2021/01/hyper-v-debugging-for-beginners-2nd.html
#reverse #hyperv #internals #darw1n
Blogspot
Hyper-V debugging for beginners. 2nd edition.
hyper-v internals
Playing in the (Windows) Sandbox: A Windows Sandbox deep dive.
https://research.checkpoint.com/2021/playing-in-the-windows-sandbox/
#reverse #hyperv #sandbox #internals #darw1n
https://research.checkpoint.com/2021/playing-in-the-windows-sandbox/
#reverse #hyperv #sandbox #internals #darw1n
Check Point Research
Playing in the (Windows) Sandbox - Check Point Research
Research By: Alex Ilgayev Introduction Two years ago, Microsoft released a new feature as a part of the Insiders build 18305 β Windows Sandbox. This sandbox has some useful specifications: Integrated part of Windows 10 (Pro/Enterprise). Runs on top of Hyperβ¦
CVE-2021-27365: Linux kernel LPE Exploit. Now with symbols for the latest RHEL8 kernel. Get it while it's still an 0day!
Github: https://github.com/grimm-co/NotQuite0DayFriday/tree/trunk/2021.03.12-linux-iscsi
The following report discloses three distinct vulnerabilities discovered by GRIMM while researching the Linux kernel. The first vulnerability is a heap buffer overflow, the second is a kernel pointer leak, and the third is an out-of-bounds kernel memory read. All three vulnerabilities are associated with the iSCSI subsystem.
Article: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html?m=1
#reverse #lpe #heap #bof #expdev #linux #darw1n
Github: https://github.com/grimm-co/NotQuite0DayFriday/tree/trunk/2021.03.12-linux-iscsi
The following report discloses three distinct vulnerabilities discovered by GRIMM while researching the Linux kernel. The first vulnerability is a heap buffer overflow, the second is a kernel pointer leak, and the third is an out-of-bounds kernel memory read. All three vulnerabilities are associated with the iSCSI subsystem.
Article: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html?m=1
#reverse #lpe #heap #bof #expdev #linux #darw1n
GitHub
NotQuite0DayFriday/2021.03.12-linux-iscsi at trunk Β· grimm-co/NotQuite0DayFriday
This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly. - grimm-co/NotQuite0DayFriday