KOPYCAT - Linux Kernel module-less implant (backdoor) https://github.com/milabs/kopycat #linux #exploitation
GitHub
GitHub - milabs/kopycat: Linux Kernel module-less implant (backdoor)
Linux Kernel module-less implant (backdoor). Contribute to milabs/kopycat development by creating an account on GitHub.
https://github.com/PositiveTechnologies/ghidra_nodejs
GHIDRA plugin to parse, disassemble and decompile NodeJS Bytenode (JSC) binaries
#ghidra #decompiler #nodejs #reverse #DrMefistO
GHIDRA plugin to parse, disassemble and decompile NodeJS Bytenode (JSC) binaries
#ghidra #decompiler #nodejs #reverse #DrMefistO
GitHub
GitHub - PositiveTechnologies/ghidra_nodejs: GHIDRA plugin to parse, disassemble and decompile NodeJS Bytenode (JSC) binaries
GHIDRA plugin to parse, disassemble and decompile NodeJS Bytenode (JSC) binaries - PositiveTechnologies/ghidra_nodejs
Flowers and chocolate cannot do what the words of love can. ππ°
Every woman in our lives is unique and beautiful. π
The power of they have inside is enormous. ππ
They are stronger than anyone can imagine. πͺπ
And we all know that this world would mean nothing without a woman. π©ββ€οΈβπ¨π¨βπ©βπ§βπ¦
So, on this special day we have an amazing opportunity to thank all of them! π₯°
Thank you for making life possible, thank you for being so different and strong! πβοΈπ¨βπ³
π₯³ Happy Womenβs Day! β¨π₯
Every woman in our lives is unique and beautiful. π
The power of they have inside is enormous. ππ
They are stronger than anyone can imagine. πͺπ
And we all know that this world would mean nothing without a woman. π©ββ€οΈβπ¨π¨βπ©βπ§βπ¦
So, on this special day we have an amazing opportunity to thank all of them! π₯°
Thank you for making life possible, thank you for being so different and strong! πβοΈπ¨βπ³
π₯³ Happy Womenβs Day! β¨π₯
Rizin and Cutter have been selected for Google Summer of Code 2021! Great opportunity for students to work with developer's teams, write code and learn about open-source! https://summerofcode.withgoogle.com/organizations/5718117306597376/ #reverse #rizin #opensource #dukeBarman
Withgoogle
Google Summer of Code
Google Summer of Code is a global program focused on bringing more developers into open source software development.
Hyper-V memory internals. Guest OS memory access
https://hvinternals.blogspot.com/2019/09/hyper-v-memory-internals-guest-os-memory-access.html
#reverse #hyperv #internals #darw1n
https://hvinternals.blogspot.com/2019/09/hyper-v-memory-internals-guest-os-memory-access.html
#reverse #hyperv #internals #darw1n
Blogspot
Hyper-V memory internals. Guest OS memory access
hyper-v internals
Hyper-V memory internals. EXO partition memory access
https://hvinternals.blogspot.com/2020/06/hyper-v-memory-internals-exo-partition.html
#reverse #hyperv #internals #darw1n
https://hvinternals.blogspot.com/2020/06/hyper-v-memory-internals-exo-partition.html
#reverse #hyperv #internals #darw1n
Blogspot
Hyper-V memory internals. EXO partition memory access
hyper-v internals
Hyper-V debugging for beginners (2nd edition)
https://hvinternals.blogspot.com/2021/01/hyper-v-debugging-for-beginners-2nd.html
#reverse #hyperv #internals #darw1n
https://hvinternals.blogspot.com/2021/01/hyper-v-debugging-for-beginners-2nd.html
#reverse #hyperv #internals #darw1n
Blogspot
Hyper-V debugging for beginners. 2nd edition.
hyper-v internals
Playing in the (Windows) Sandbox: A Windows Sandbox deep dive.
https://research.checkpoint.com/2021/playing-in-the-windows-sandbox/
#reverse #hyperv #sandbox #internals #darw1n
https://research.checkpoint.com/2021/playing-in-the-windows-sandbox/
#reverse #hyperv #sandbox #internals #darw1n
Check Point Research
Playing in the (Windows) Sandbox - Check Point Research
Research By: Alex Ilgayev Introduction Two years ago, Microsoft released a new feature as a part of the Insiders build 18305 β Windows Sandbox. This sandbox has some useful specifications: Integrated part of Windows 10 (Pro/Enterprise). Runs on top of Hyperβ¦
CVE-2021-27365: Linux kernel LPE Exploit. Now with symbols for the latest RHEL8 kernel. Get it while it's still an 0day!
Github: https://github.com/grimm-co/NotQuite0DayFriday/tree/trunk/2021.03.12-linux-iscsi
The following report discloses three distinct vulnerabilities discovered by GRIMM while researching the Linux kernel. The first vulnerability is a heap buffer overflow, the second is a kernel pointer leak, and the third is an out-of-bounds kernel memory read. All three vulnerabilities are associated with the iSCSI subsystem.
Article: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html?m=1
#reverse #lpe #heap #bof #expdev #linux #darw1n
Github: https://github.com/grimm-co/NotQuite0DayFriday/tree/trunk/2021.03.12-linux-iscsi
The following report discloses three distinct vulnerabilities discovered by GRIMM while researching the Linux kernel. The first vulnerability is a heap buffer overflow, the second is a kernel pointer leak, and the third is an out-of-bounds kernel memory read. All three vulnerabilities are associated with the iSCSI subsystem.
Article: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html?m=1
#reverse #lpe #heap #bof #expdev #linux #darw1n
GitHub
NotQuite0DayFriday/2021.03.12-linux-iscsi at trunk Β· grimm-co/NotQuite0DayFriday
This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly. - grimm-co/NotQuite0DayFriday
VM Detection Tricks, Part 1: Physical memory resource maps
In this series weβll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021. These detection tricks will be focused on 64-bit Windows 10 or Windows Server 2019 guests, targeting a variety of VM platforms.
https://labs.nettitude.com/blog/vm-detection-tricks-part-1-physical-memory-resource-maps/
#reverse #detect #vm #malware #redteam #darw1n
In this series weβll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021. These detection tricks will be focused on 64-bit Windows 10 or Windows Server 2019 guests, targeting a variety of VM platforms.
https://labs.nettitude.com/blog/vm-detection-tricks-part-1-physical-memory-resource-maps/
#reverse #detect #vm #malware #redteam #darw1n
LRQA
VM Detection Tricks, Part 1: Physical memory resource maps
In this series weβll document a novel and as-yet-undocumented Virtual Machine detection trick for each month of 2021. These detection tricks will be focused on 64-bit Windows 10 or Windows Server 2019 guests, targeting a variety of VM platforms.
x64dbg plugin for simple spoofing of CPUID instruction behavior
https://github.com/jonatan1024/CpuidSpoofer
#reverse #tools #plugin #x64 #debugger #hwid #darw1n
https://github.com/jonatan1024/CpuidSpoofer
#reverse #tools #plugin #x64 #debugger #hwid #darw1n
GitHub
GitHub - jonatan1024/CpuidSpoofer: x64dbg plugin for simple spoofing of CPUID instruction behavior
x64dbg plugin for simple spoofing of CPUID instruction behavior - jonatan1024/CpuidSpoofer
fpicker: Fuzzing with Frida
https://insinuator.net/2021/03/fpicker-fuzzing-with-frida/
Fpicker is a Frida-based coverage-guided, mostly in-process, blackbox fuzzing suite. Its most significant feature is the AFL++ proxy mode which enables blackbox in-process fuzzing with AFL++ on platforms supported by Frida.
https://github.com/ttdennis/fpicker
#reverse #afl #frida #darw1n
https://insinuator.net/2021/03/fpicker-fuzzing-with-frida/
Fpicker is a Frida-based coverage-guided, mostly in-process, blackbox fuzzing suite. Its most significant feature is the AFL++ proxy mode which enables blackbox in-process fuzzing with AFL++ on platforms supported by Frida.
https://github.com/ttdennis/fpicker
#reverse #afl #frida #darw1n
How I cut GTA Online loading times by 70% (how the Reverse Engineering helps to improve game and earn bug bounty at H1) https://nee.lv/2021/02/28/How-I-cut-GTA-Online-loading-times-by-70/ #reverse #dukeBarman
meh.
How I cut GTA Online loading times by 70%
GTA Online. Infamous for its slow loading times. Having picked up the game again to finish some of the newer heists I was shocked (/s) to discover that it still loads just as slow as the day it was re
Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.
https://github.com/D3VI5H4/Antivirus-Artifacts
#malware #av #redteam #artifacts #darw1n
https://github.com/D3VI5H4/Antivirus-Artifacts
#malware #av #redteam #artifacts #darw1n
GitHub
GitHub - ethereal-vx/Antivirus-Artifacts: Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytesβ¦
Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot. - ethereal-vx/Antivirus-Artifacts
In-the-Wild Series: October 2020 0-day discovery
https://googleprojectzero.blogspot.com/2021/03/in-wild-series-october-2020-0-day.html
In October 2020, Google Project Zero discovered seven 0-day exploits being actively used in-the-wild. These exploits were delivered via "watering hole" attacks in a handful of websites pointing to two exploit servers that hosted exploit chains for Android, Windows, and iOS devices. These attacks appear to be the next iteration of the campaign discovered in February 2020 and documented in below blog posts:
Part1: Introducing the In-the-Wild Series
https://googleprojectzero.blogspot.com/2021/01/introducing-in-wild-series.html
Part2: Chrome Infinity Bug
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-infinity-bug.html
Part3: Chrome Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-exploits.html
Part4: Android Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html
Part5: Android Post-Exploitation
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-post-exploitation.html
Part6: Windows Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-windows-exploits.html
#reverse #expdev #rce #lpe #sandbox #escape #android #ios #windows #chrome #browser #darw1n
https://googleprojectzero.blogspot.com/2021/03/in-wild-series-october-2020-0-day.html
In October 2020, Google Project Zero discovered seven 0-day exploits being actively used in-the-wild. These exploits were delivered via "watering hole" attacks in a handful of websites pointing to two exploit servers that hosted exploit chains for Android, Windows, and iOS devices. These attacks appear to be the next iteration of the campaign discovered in February 2020 and documented in below blog posts:
Part1: Introducing the In-the-Wild Series
https://googleprojectzero.blogspot.com/2021/01/introducing-in-wild-series.html
Part2: Chrome Infinity Bug
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-infinity-bug.html
Part3: Chrome Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-exploits.html
Part4: Android Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html
Part5: Android Post-Exploitation
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-post-exploitation.html
Part6: Windows Exploits
https://googleprojectzero.blogspot.com/2021/01/in-wild-series-windows-exploits.html
#reverse #expdev #rce #lpe #sandbox #escape #android #ios #windows #chrome #browser #darw1n
Blogspot
In-the-Wild Series: October 2020 0-day discovery
Posted by Maddie Stone, Project Zero In October 2020, Google Project Zero discovered seven 0-day exploits being actively used in-the-w...
BinDiff 7 beta coming soon. Request yours here: https://docs.google.com/forms/d/e/1FAIpQLSdEPDTnopPEzbXXmTktshVfJb28YiFahYoRfya92yIi5iEFdg/viewform #reverse #dukeBarman
Google Docs
BinDiff 7 Beta
Test-drive the new BinDiff 7 before release.
Changes:
- Full support for IDA Pro 7.6
- New open-source Binary Ninja exporter
- Faster BinExport
- JSON based config file format
- Better HiDPI support
- macOS: Universal Binaries supporting ARM64 (aka "Appleβ¦
Changes:
- Full support for IDA Pro 7.6
- New open-source Binary Ninja exporter
- Faster BinExport
- JSON based config file format
- Better HiDPI support
- macOS: Universal Binaries supporting ARM64 (aka "Appleβ¦
Free Malware Analysis training. Volume 1 via hasherezade https://github.com/hasherezade/malware_training_vol1 (in progress) #reverse #malware #dukeBarman
GitHub
GitHub - hasherezade/malware_training_vol1: Materials for Windows Malware Analysis training (volume 1)
Materials for Windows Malware Analysis training (volume 1) - hasherezade/malware_training_vol1